The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
History

Thu, 09 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-116
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 09 Jan 2025 01:00:00 +0000

Type Values Removed Values Added
Description A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header. The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-01-09T21:28:00.488Z

Reserved: 2023-03-15T01:00:13.221Z

Link: CVE-2023-28362

cve-icon Vulnrichment

Updated: 2025-01-09T21:27:49.728Z

cve-icon NVD

Status : Received

Published: 2025-01-09T01:15:07.750

Modified: 2025-01-09T22:15:26.737

Link: CVE-2023-28362

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-27T00:00:00Z

Links: CVE-2023-28362 - Bugzilla