Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/gitlab@13.10.4-1
Typealpm
Namespacearchlinux
Namegitlab
Version13.10.4-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version13.12.2-1
Latest_non_vulnerable_version15.2.1-1
Affected_by_vulnerabilities
0
url VCID-msda-xqbp-qfdd
vulnerability_id VCID-msda-xqbp-qfdd
summary
Possible Open Redirect Vulnerability in Action Pack
There is a possible Open Redirect Vulnerability in Action Pack.

Versions Affected:  >= v6.1.0.rc2
Not affected:       < v6.1.0.rc2
Fixed Versions:     6.1.3.2

Impact
------
This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious
website.

Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com.


Releases
--------
The fixed releases are available at the normal locations.

Workarounds
-----------
The following monkey patch put in an initializer can be used as a workaround.

```ruby
class ActionDispatch::HostAuthorization::Permissions
  def sanitize_string(host)
    if host.start_with?(".")
      /\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i
    else
      /\A#{Regexp.escape host}\z/i
    end
  end
end
```

Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.

* 6-1-open-redirect.patch - Patch for 6.1 series

Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.

Credits
-------

Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22903.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22903.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22903
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35693
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.3589
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.3592
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35751
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35801
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35823
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35831
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35791
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35768
published_at 2026-04-13T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35808
published_at 2026-04-16T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35796
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22903
2
reference_url https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails/releases/tag/v6.1.3.2
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails/releases/tag/v6.1.3.2
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22903.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22903.yml
6
reference_url https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0
7
reference_url https://hackerone.com/reports/1148025
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1148025
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22903
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-22903
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1957438
reference_id 1957438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1957438
10
reference_url https://security.archlinux.org/AVG-1919
reference_id AVG-1919
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1919
11
reference_url https://github.com/advisories/GHSA-5hq2-xf89-9jxq
reference_id GHSA-5hq2-xf89-9jxq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5hq2-xf89-9jxq
fixed_packages
aliases CVE-2021-22903, GHSA-5hq2-xf89-9jxq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msda-xqbp-qfdd
Fixing_vulnerabilities
0
url VCID-24mf-t2wp-t7cb
vulnerability_id VCID-24mf-t2wp-t7cb
summary An issue has been discovered in GitLab affecting all versions starting from 11.6. Pull mirror credentials are exposed that allows other maintainers to be able to view the credentials in plain-text,
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22206
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30204
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.3036
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30389
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30435
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30246
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30306
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.3034
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30344
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.303
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30252
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30267
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30249
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22206
1
reference_url https://security.archlinux.org/ASA-202105-4
reference_id ASA-202105-4
reference_type
scores
url https://security.archlinux.org/ASA-202105-4
2
reference_url https://security.archlinux.org/AVG-1888
reference_id AVG-1888
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1888
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.10.4-1
purl pkg:alpm/archlinux/gitlab@13.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-msda-xqbp-qfdd
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1
aliases CVE-2021-22206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24mf-t2wp-t7cb
1
url VCID-6tyy-j5zg-zkgw
vulnerability_id VCID-6tyy-j5zg-zkgw
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7. GitLab Dependency Proxy, under certain circumstances, can impersonate a user resulting in possibly incorrect access handling.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22211
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37459
published_at 2026-04-21T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37411
published_at 2026-04-01T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37577
published_at 2026-04-02T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37601
published_at 2026-04-04T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37478
published_at 2026-04-07T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37529
published_at 2026-04-08T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37542
published_at 2026-04-16T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37556
published_at 2026-04-11T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37521
published_at 2026-04-12T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37495
published_at 2026-04-13T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37523
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22211
1
reference_url https://security.archlinux.org/ASA-202105-4
reference_id ASA-202105-4
reference_type
scores
url https://security.archlinux.org/ASA-202105-4
2
reference_url https://security.archlinux.org/AVG-1888
reference_id AVG-1888
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1888
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.10.4-1
purl pkg:alpm/archlinux/gitlab@13.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-msda-xqbp-qfdd
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1
aliases CVE-2021-22211
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tyy-j5zg-zkgw
2
url VCID-6yhw-9sqw-zuge
vulnerability_id VCID-6yhw-9sqw-zuge
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22209
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40357
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40353
published_at 2026-04-01T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.4044
published_at 2026-04-02T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40466
published_at 2026-04-04T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40389
published_at 2026-04-07T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40441
published_at 2026-04-08T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40452
published_at 2026-04-09T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40473
published_at 2026-04-11T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40435
published_at 2026-04-12T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-13T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40464
published_at 2026-04-16T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.40432
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22209
1
reference_url https://security.archlinux.org/ASA-202105-4
reference_id ASA-202105-4
reference_type
scores
url https://security.archlinux.org/ASA-202105-4
2
reference_url https://security.archlinux.org/AVG-1888
reference_id AVG-1888
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1888
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.10.4-1
purl pkg:alpm/archlinux/gitlab@13.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-msda-xqbp-qfdd
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1
aliases CVE-2021-22209
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yhw-9sqw-zuge
3
url VCID-n7n7-hk7v-rqa4
vulnerability_id VCID-n7n7-hk7v-rqa4
summary An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2. When querying the repository branches through API, GitLab was ignoring a query parameter and returning a considerable amount of results.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22210
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34621
published_at 2026-04-21T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34504
published_at 2026-04-01T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34722
published_at 2026-04-02T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34748
published_at 2026-04-04T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34626
published_at 2026-04-07T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34669
published_at 2026-04-08T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34697
published_at 2026-04-09T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.347
published_at 2026-04-11T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34662
published_at 2026-04-12T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34637
published_at 2026-04-13T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34676
published_at 2026-04-16T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34661
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22210
1
reference_url https://security.archlinux.org/ASA-202105-4
reference_id ASA-202105-4
reference_type
scores
url https://security.archlinux.org/ASA-202105-4
2
reference_url https://security.archlinux.org/AVG-1888
reference_id AVG-1888
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1888
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.10.4-1
purl pkg:alpm/archlinux/gitlab@13.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-msda-xqbp-qfdd
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1
aliases CVE-2021-22210
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7n7-hk7v-rqa4
4
url VCID-unhf-zjns-n7fn
vulnerability_id VCID-unhf-zjns-n7fn
summary An issue has been discovered in GitLab affecting versions starting with 13.5 up to 13.9.7. Improper permission check could allow the change of timestamp for issue creation or update.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22208
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40109
published_at 2026-04-21T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.4005
published_at 2026-04-01T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40199
published_at 2026-04-02T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-04T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40147
published_at 2026-04-07T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.402
published_at 2026-04-08T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40212
published_at 2026-04-09T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40223
published_at 2026-04-11T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-12T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-13T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40217
published_at 2026-04-16T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.40187
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22208
1
reference_url https://security.archlinux.org/ASA-202105-4
reference_id ASA-202105-4
reference_type
scores
url https://security.archlinux.org/ASA-202105-4
2
reference_url https://security.archlinux.org/AVG-1888
reference_id AVG-1888
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1888
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.10.4-1
purl pkg:alpm/archlinux/gitlab@13.10.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-msda-xqbp-qfdd
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1
aliases CVE-2021-22208
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unhf-zjns-n7fn
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.10.4-1