DescriptionMissing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted domain name and not the malicious domain name, then (as well as would be inadvertently allowed.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-rack-cors (PTS)stretch0.4.0-1+deb9u1fixed
stretch (security)0.4.0-1+deb9u2fixed
buster, buster (security)1.0.2-1+deb10u1fixed
bullseye, sid1.1.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-rack-corssourcejessie(not affected)


[jessie] - ruby-rack-cors <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems