The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-116 | |
Metrics |
cvssV3_1
|
ssvc
|
Thu, 09 Jan 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header. | The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. |
References |
|
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-01-09T21:28:00.488Z
Reserved: 2023-03-15T01:00:13.221Z
Link: CVE-2023-28362

Updated: 2025-01-09T21:27:49.728Z

Status : Received
Published: 2025-01-09T01:15:07.750
Modified: 2025-01-09T22:15:26.737
Link: CVE-2023-28362
