CVE-2008-5189:
rails is vulnerable to CRLF injection
5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/24/2017
Updated
5/11/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rails | rubygems | < 2.0.5 | 2.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The patch modifies the redirect method in ActionController::Response to add CRLF sanitization. The original code directly used user-controlled 'to_url' parameter for both Location header and response body without filtering. This would appear in runtime traces when processing redirects, as it's the core method handling HTTP redirection logic. The vulnerability manifests here because attackers could inject CRLF sequences to create malicious HTTP headers.