Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22881 PoC — Rails Action Pack 输入验证错误漏洞

Source
Associated Vulnerability
Title:Rails Action Pack 输入验证错误漏洞 (CVE-2021-22881)
Description:Rails Action Pack是美国Rails社区的一个web框架。提供了路由机制(将请求URL映射到动作),定义实现动作的控制器以及通过渲染视图(各种格式的模板)生成响应的机制。 Action Pack中存在输入验证错误漏洞,该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
Description
Ruby on Rails action pack before 6.1.2.1, 6.0.3.5 contains an open redirect caused by special crafted Host headers in combination with allowed host formats, letting attackers redirect users to malicious websites, exploit requires attacker to control Host headers.
File Snapshot

id: CVE-2021-22881 info: name: Ruby on Rails - Open Redirect via Host Header Injection author: ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.