| ID |
CVE-2021-29479
|
| Sažetak |
Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a user supplied `X-Forwarded-Host` header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the `X-Forwarded-Host` header as a cache key. Users are only vulnerable if they do not configure a custom `PublicAddress` instance. For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of `PublicAddress` which is vulnerable. This can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location. The vulnerability was patched in Ratpack 1.9.0. As a workaround, ensure that `ServerConfigBuilder::publicAddress` correctly configures the server in production. |
| Reference |
|
| CVSS |
| Base: | 4.0 |
| Impact: | 4.9 |
| Exploitability: | 4.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
PARTIAL |
NONE |
|
| CVSS vektor |
AV:N/AC:H/Au:N/C:P/I:P/A:N |
| Zadnje važnije ažuriranje |
08-07-2021 - 15:42 |
| Objavljeno |
29-06-2021 - 15:15 |