Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/rails@6.1.0.rc2
purl pkg:gem/rails@6.1.0.rc2
Next non-vulnerable version 6.1.7.7
Latest non-vulnerable version 7.1.3.1
Risk 3.4
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-1x8k-t8mr-3fgp
Aliases:
CVE-2021-44528
GHSA-qphc-hf5q-v8fc
URL Redirection to Untrusted Site ('Open Redirect') A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
6.1.4.3
Affected by 4 other vulnerabilities.
7.0.1
Affected by 6 other vulnerabilities.
VCID-65tq-e5eb-eucj
Aliases:
CVE-2024-26144
GHSA-8h22-8cf7-hq6g
Rails has possible Sensitive Session Information Leak in Active Storage # Possible Sensitive Session Information Leak in Active Storage There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a `Set-Cookie` header along with the user's session cookie when serving blobs. It also sets `Cache-Control` to public. Certain proxies may cache the Set-Cookie, leading to an information leak. This vulnerability has been assigned the CVE identifier CVE-2024-26144. Versions Affected: >= 5.2.0, < 7.1.0 Not affected: < 5.2.0, > 7.1.0 Fixed Versions: 7.0.8.1, 6.1.7.7 Impact ------ A proxy which chooses to caches this request can cause users to share sessions. This may include a user receiving an attacker's session or vice versa. This was patched in 7.1.0 but not previously identified as a security vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Upgrade to Rails 7.1.X, or configure caching proxies not to cache the Set-Cookie headers. Credits ------- Thanks to [tyage](https://hackerone.com/tyage) for reporting this!
6.1.7.7
Affected by 0 other vulnerabilities.
7.0.8.1
Affected by 0 other vulnerabilities.
VCID-hppf-a715-r7b2
Aliases:
CVE-2023-22795
GHSA-8xww-x3g3-6jcv
GMS-2023-56
ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
6.1.7.1
Affected by 1 other vulnerability.
7.0.4.1
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:52:39.636498+00:00 GitLab Importer Affected by VCID-65tq-e5eb-eucj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26144.yml 38.4.0
2026-04-16T22:21:28.639130+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.4.0
2026-04-16T21:37:23.895715+00:00 GitLab Importer Affected by VCID-1x8k-t8mr-3fgp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-44528.yml 38.4.0
2026-04-12T00:11:15.899129+00:00 GitLab Importer Affected by VCID-65tq-e5eb-eucj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26144.yml 38.3.0
2026-04-11T23:39:31.304472+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.3.0
2026-04-11T22:51:26.620531+00:00 GitLab Importer Affected by VCID-1x8k-t8mr-3fgp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-44528.yml 38.3.0
2026-04-03T00:17:16.785684+00:00 GitLab Importer Affected by VCID-65tq-e5eb-eucj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26144.yml 38.1.0
2026-04-02T23:43:40.856431+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.1.0
2026-04-02T23:00:53.070446+00:00 GitLab Importer Affected by VCID-1x8k-t8mr-3fgp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-44528.yml 38.1.0
2026-04-01T18:06:35.106799+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.0.0
2026-04-01T17:19:37.600263+00:00 GitLab Importer Affected by VCID-1x8k-t8mr-3fgp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-44528.yml 38.0.0