HIGH · 8.8

CVE-2021-33621

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTT...

Vulnerability Description

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Ruby-LangCgi< 0.1.0.2
FedoraprojectFedora35
Ruby-LangRuby>= 2.7.0, < 2.7.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-33621?

CVE-2021-33621 is a vulnerability with a CVSS score of 8.8 (HIGH). The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTT...

How severe is CVE-2021-33621?

CVE-2021-33621 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2021-33621?

Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Cgi, Fedoraproject Fedora, Ruby-Lang Ruby.