Skip to content

Commit 5e1d0c5

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@a30efc4
1 parent 96d91e8 commit 5e1d0c5

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-21510 (sinatra): Sinatra vulnerable to Reliance on Untrusted Inputs
4+
in a Security Decision'
5+
comments: false
6+
categories:
7+
- sinatra
8+
advisory:
9+
gem: sinatra
10+
cve: 2024-21510
11+
ghsa: hxx2-7vcw-mqr3
12+
url: https://github.com/advisories/GHSA-hxx2-7vcw-mqr3
13+
title: Sinatra vulnerable to Reliance on Untrusted Inputs in a Security Decision
14+
date: 2024-11-01
15+
description: |
16+
Versions of the package sinatra from 0.0.0 are vulnerable to
17+
Reliance on Untrusted Inputs in a Security Decision via the
18+
X-Forwarded-Host (XFH) header.
19+
20+
When making a request to a method with redirect applied, it is
21+
possible to trigger an Open Redirect Attack by inserting an
22+
arbitrary address into this header. If used for caching purposes,
23+
such as with servers like Nginx, or as a reverse proxy, without
24+
handling the X-Forwarded-Host header, attackers can potentially
25+
exploit Cache Poisoning or Routing-based SSRF.
26+
cvss_v3: 5.4
27+
notes: Never patched
28+
related:
29+
url:
30+
- https://nvd.nist.gov/vuln/detail/CVE-2024-21510
31+
- https://security.snyk.io/vuln/SNYK-RUBY-SINATRA-6483832
32+
- https://github.com/sinatra/sinatra/pull/2010
33+
- https://github.com/sinatra/sinatra/blob/b626e2d82c23b4fde0b51782fd32ca27ccde1d1a/lib/sinatra/base.rb#L319
34+
- https://github.com/sinatra/sinatra/blob/b626e2d82c23b4fde0b51782fd32ca27ccde1d1a/lib/sinatra/base.rb#L323C1-L343C17
35+
- https://github.com/advisories/GHSA-hxx2-7vcw-mqr3
36+
---

0 commit comments

Comments
 (0)