DescriptionMissing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted domain name and not the malicious domain name, then (as well as would be inadvertently allowed.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-rack-cors (PTS)jessie0.2.9-1fixed
stretch (security), stretch0.4.0-1+deb9u1fixed
buster, sid1.0.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-rack-corssourcejessie(not affected)


[jessie] - ruby-rack-cors <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems