Lookup for vulnerable packages by Package URL.

Purlpkg:gem/actionpack@5.2.0.0
Typegem
Namespace
Nameactionpack
Version5.2.0.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version7.0.8.7
Latest_non_vulnerable_version8.1.2.1
Affected_by_vulnerabilities
0
url VCID-gjey-bqtd-kqa1
vulnerability_id VCID-gjey-bqtd-kqa1
summary
Action Pack contains Information Disclosure / Unintended Method Execution vulnerability
Impact
------
There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input.

Vulnerable code will look like this.

```
redirect_to(params[:some_param])
```

All users running an affected release should either upgrade or use one of the workarounds immediately.

Releases
--------
The FIXED releases are available at the normal locations.

Workarounds
-----------
To work around this problem, it is recommended to use an allow list for valid parameters passed from the user.  For example,

```ruby
private def check(param)
  case param
  when "valid"
    param
  else
    "/"
  end
end

def index
  redirect_to(check(params[:some_param]))
end
```

Or force the user input to be cast to a string like this,

```ruby
def index
  redirect_to(params[:some_param].to_s)
end
```

Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.

* 5-2-information-disclosure.patch - Patch for 5.2 series
* 6-0-information-disclosure.patch - Patch for 6.0 series
* 6-1-information-disclosure.patch - Patch for 6.1 series

Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.

Credits
-------

Thanks to Benoit Côté-Jodoin from Shopify for reporting this.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22885.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22885
reference_id
reference_type
scores
0
value 0.03096
scoring_system epss
scoring_elements 0.86797
published_at 2026-04-13T12:55:00Z
1
value 0.03096
scoring_system epss
scoring_elements 0.86815
published_at 2026-04-21T12:55:00Z
2
value 0.03096
scoring_system epss
scoring_elements 0.86736
published_at 2026-04-01T12:55:00Z
3
value 0.03096
scoring_system epss
scoring_elements 0.86817
published_at 2026-04-18T12:55:00Z
4
value 0.03096
scoring_system epss
scoring_elements 0.86812
published_at 2026-04-16T12:55:00Z
5
value 0.03096
scoring_system epss
scoring_elements 0.86746
published_at 2026-04-02T12:55:00Z
6
value 0.03096
scoring_system epss
scoring_elements 0.86765
published_at 2026-04-04T12:55:00Z
7
value 0.03096
scoring_system epss
scoring_elements 0.86763
published_at 2026-04-07T12:55:00Z
8
value 0.03096
scoring_system epss
scoring_elements 0.86783
published_at 2026-04-08T12:55:00Z
9
value 0.03096
scoring_system epss
scoring_elements 0.86791
published_at 2026-04-09T12:55:00Z
10
value 0.03096
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-11T12:55:00Z
11
value 0.03096
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22880
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22904
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22885.yml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22885.yml
7
reference_url https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI
8
reference_url https://hackerone.com/reports/1106652
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1106652
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22885
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-22885
10
reference_url https://security.netapp.com/advisory/ntap-20210805-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210805-0009
11
reference_url https://security.netapp.com/advisory/ntap-20210805-0009/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210805-0009/
12
reference_url https://www.debian.org/security/2021/dsa-4929
reference_id
reference_type
scores
url https://www.debian.org/security/2021/dsa-4929
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1957441
reference_id 1957441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1957441
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988214
reference_id 988214
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988214
15
reference_url https://security.archlinux.org/AVG-1920
reference_id AVG-1920
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1920
16
reference_url https://security.archlinux.org/AVG-1921
reference_id AVG-1921
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1921
17
reference_url https://security.archlinux.org/AVG-2090
reference_id AVG-2090
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2090
18
reference_url https://security.archlinux.org/AVG-2223
reference_id AVG-2223
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2223
19
reference_url https://github.com/advisories/GHSA-hjg4-8q5f-x6fm
reference_id GHSA-hjg4-8q5f-x6fm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hjg4-8q5f-x6fm
20
reference_url https://access.redhat.com/errata/RHSA-2021:4702
reference_id RHSA-2021:4702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4702
fixed_packages
0
url pkg:gem/actionpack@5.2.4.6
purl pkg:gem/actionpack@5.2.4.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63gy-6njy-kbd8
1
vulnerability VCID-ce39-j83r-6ug9
2
vulnerability VCID-dd9p-x7k3-37ea
3
vulnerability VCID-ehbj-aezy-d7h4
4
vulnerability VCID-g3rk-djae-pkeh
5
vulnerability VCID-hppf-a715-r7b2
6
vulnerability VCID-jwun-grgg-2uet
7
vulnerability VCID-msda-xqbp-qfdd
8
vulnerability VCID-p5mc-r1rg-5ff7
9
vulnerability VCID-sfyc-jewr-wuf5
10
vulnerability VCID-sgdb-985e-4uej
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@5.2.4.6
1
url pkg:gem/actionpack@5.2.6
purl pkg:gem/actionpack@5.2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63gy-6njy-kbd8
1
vulnerability VCID-ce39-j83r-6ug9
2
vulnerability VCID-dd9p-x7k3-37ea
3
vulnerability VCID-ehbj-aezy-d7h4
4
vulnerability VCID-g3rk-djae-pkeh
5
vulnerability VCID-hppf-a715-r7b2
6
vulnerability VCID-jwun-grgg-2uet
7
vulnerability VCID-msda-xqbp-qfdd
8
vulnerability VCID-p5mc-r1rg-5ff7
9
vulnerability VCID-sfyc-jewr-wuf5
10
vulnerability VCID-sgdb-985e-4uej
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@5.2.6
2
url pkg:gem/actionpack@6.0.3.7
purl pkg:gem/actionpack@6.0.3.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bxs-yghe-cyck
1
vulnerability VCID-1x8k-t8mr-3fgp
2
vulnerability VCID-63gy-6njy-kbd8
3
vulnerability VCID-ce39-j83r-6ug9
4
vulnerability VCID-dd9p-x7k3-37ea
5
vulnerability VCID-ehbj-aezy-d7h4
6
vulnerability VCID-g3rk-djae-pkeh
7
vulnerability VCID-hppf-a715-r7b2
8
vulnerability VCID-jwun-grgg-2uet
9
vulnerability VCID-msda-xqbp-qfdd
10
vulnerability VCID-p5mc-r1rg-5ff7
11
vulnerability VCID-sfyc-jewr-wuf5
12
vulnerability VCID-sgdb-985e-4uej
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.0.3.7
3
url pkg:gem/actionpack@6.1.3.1
purl pkg:gem/actionpack@6.1.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bxs-yghe-cyck
1
vulnerability VCID-1x8k-t8mr-3fgp
2
vulnerability VCID-63gy-6njy-kbd8
3
vulnerability VCID-ce39-j83r-6ug9
4
vulnerability VCID-dd9p-x7k3-37ea
5
vulnerability VCID-ehbj-aezy-d7h4
6
vulnerability VCID-g3rk-djae-pkeh
7
vulnerability VCID-gjey-bqtd-kqa1
8
vulnerability VCID-hppf-a715-r7b2
9
vulnerability VCID-jwun-grgg-2uet
10
vulnerability VCID-msda-xqbp-qfdd
11
vulnerability VCID-p22r-u1dd-b7b3
12
vulnerability VCID-p5mc-r1rg-5ff7
13
vulnerability VCID-sfyc-jewr-wuf5
14
vulnerability VCID-sgdb-985e-4uej
15
vulnerability VCID-wg3a-j2dp-ayh4
16
vulnerability VCID-wyy6-h8bq-vyde
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.1.3.1
4
url pkg:gem/actionpack@6.1.3.2
purl pkg:gem/actionpack@6.1.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bxs-yghe-cyck
1
vulnerability VCID-1x8k-t8mr-3fgp
2
vulnerability VCID-63gy-6njy-kbd8
3
vulnerability VCID-ce39-j83r-6ug9
4
vulnerability VCID-dd9p-x7k3-37ea
5
vulnerability VCID-ehbj-aezy-d7h4
6
vulnerability VCID-g3rk-djae-pkeh
7
vulnerability VCID-hppf-a715-r7b2
8
vulnerability VCID-jwun-grgg-2uet
9
vulnerability VCID-p22r-u1dd-b7b3
10
vulnerability VCID-p5mc-r1rg-5ff7
11
vulnerability VCID-sfyc-jewr-wuf5
12
vulnerability VCID-sgdb-985e-4uej
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.1.3.2
aliases CVE-2021-22885, GHSA-hjg4-8q5f-x6fm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjey-bqtd-kqa1
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/actionpack@5.2.0.0