Source: ruby-sinatra Version: 3.2.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for ruby-sinatra. CVE-2024-21510[0]: | Versions of the package sinatra from 0.0.0 are vulnerable to | Reliance on Untrusted Inputs in a Security Decision via the | X-Forwarded-Host (XFH) header. When making a request to a method | with redirect applied, it is possible to trigger an Open Redirect | Attack by inserting an arbitrary address into this header. If used | for caching purposes, such as with servers like Nginx, or as a | reverse proxy, without handling the X-Forwarded-Host header, | attackers can potentially exploit Cache Poisoning or Routing-based | SSRF. As of filling this bugreport, please be awaere that a complete fix in yet unavailable, cf. as well https://bugzilla.suse.com/show_bug.cgi?id=1232746 . Can you maybe please approach upstream to query the current status? If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-21510 https://www.cve.org/CVERecord?id=CVE-2024-21510 [1] https://security.snyk.io/vuln/SNYK-RUBY-SINATRA-6483832 [2] https://github.com/sinatra/sinatra/pull/2010 Please adjust the affected versions in the BTS as needed. Regards, Salvatore