DEBIAN-CVE-2021-33621

Source
https://security-tracker.debian.org/tracker/CVE-2021-33621
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-33621.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2021-33621
Upstream
Published
2022-11-18T23:15:18Z
Modified
2025-09-30T05:15:05.672911Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

References

Affected packages

Debian:11 / ruby2.7

Package

Name
ruby2.7
Purl
pkg:deb/debian/ruby2.7?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.4-1+deb11u2

Affected versions

2.*

2.7.4-1
2.7.4-1+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ruby3.1

Package

Name
ruby3.1
Purl
pkg:deb/debian/ruby3.1?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.2-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}