CVE-2021-41819
moderate-risk
Published 2022-01-01
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
Do I need to act?
-
0.76% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (16)
References (12)
Permissions Required
https://hackerone.com/reports/910552
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220121-0003/
Permissions Required
https://hackerone.com/reports/910552
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220121-0003/
47
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
18/34 · Moderate