MGASA-2022-0454

Source
https://advisories.mageia.org/MGASA-2022-0454.html
Import Source
https://advisories.mageia.org/MGASA-2022-0454.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0454
Related
Published
2022-12-13T22:09:19Z
Modified
2022-12-13T21:13:19Z
Summary
Updated ruby packages fix security vulnerability
Details

If an application that generates HTTP responses using the cgi gem with untrusted user input, an attacker can exploit it to inject a malicious HTTP response header and/or body.

Also, the contents for a CGI::Cookie object were not checked properly. If an application creates a CGI::Cookie object based on user input, an attacker may exploit it to inject invalid attributes in Set-Cookie header. Such applications are unlikely, but a change is included to check arguments for CGI::Cookie#initialize preventatively.

References
Credits

Affected packages

Mageia:8 / ruby

Package

Name
ruby
Purl
pkg:rpm/mageia/ruby?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.7-33.6.mga8

Ecosystem specific

{
    "section": "core"
}