A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
                
            References
                    | Link | Resource | 
|---|---|
| https://hackerone.com/reports/1106652 | Exploit Third Party Advisory | 
| https://security.netapp.com/advisory/ntap-20210805-0009/ | Third Party Advisory | 
| https://www.debian.org/security/2021/dsa-4929 | Third Party Advisory | 
| https://hackerone.com/reports/1106652 | Exploit Third Party Advisory | 
| https://security.netapp.com/advisory/ntap-20210805-0009/ | Third Party Advisory | 
| https://www.debian.org/security/2021/dsa-4929 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2021-05-27 12:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22885
Mitre link : CVE-2021-22885
CVE.ORG link : CVE-2021-22885
JSON object : View
Products Affected
                rubyonrails
- rails
- actionpack_page-caching
debian
- debian_linux
CWE
                
                    
                        
                        CWE-209
                        
            Generation of Error Message Containing Sensitive Information
