Miggo Logo

CVE-2023-22797: Open Redirect Vulnerability in Action Pack

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.31929%
Published
1/18/2023
Updated
6/27/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
actionpackrubygems>= 7.0.0, < 7.0.4.17.0.4.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists in the URL host validation check implemented in Rails 7.0's redirect_to protection. The patch name ('Fix-sec-issue-with-_url_host_allowed.patch') and release notes explicitly reference fixes to _url_host_allowed? as the root cause. This method was responsible for validating redirect targets but contained bypassable checks, making it the clear vulnerable function. The vulnerability manifests when this method fails to properly validate crafted URLs passed to redirect_to with user input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T**r* is * vuln*r**ility in **tion *ontroll*r’s r**ir**t_to. T*is vuln*r**ility **s ***n *ssi*n** t** *V* i**nti*i*r *V*-****-*****. V*rsions *****t**: >= *.*.* Not *****t**: < *.*.* *ix** V*rsions: *.*.*.* Imp**t T**r* is * possi*l* op*n r**ir**t

Reasoning

T** vuln*r**ility *xists in t** URL *ost v*li**tion ****k impl*m*nt** in R*ils *.*'s r**ir**t_to prot**tion. T** p*t** n*m* ('*ix-s**-issu*-wit*-_url_*ost_*llow**.p*t**') *n* r*l**s* not*s *xpli*itly r***r*n** *ix*s to _url_*ost_*llow**? *s t** root