A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815 | third party advisory patch |
https://www.debian.org/security/2023/dsa-5372 | vendor advisory |
https://security.netapp.com/advisory/ntap-20240208-0003/ |