{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-41816","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-04T03:22:24.883Z","dateReserved":"2021-09-29T00:00:00.000Z","datePublished":"2022-02-06T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-01-24T05:06:22.268Z"},"descriptions":[{"lang":"en","value":"CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://hackerone.com/reports/1328463"},{"url":"https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/"},{"url":"https://security-tracker.debian.org/tracker/CVE-2021-41816"},{"url":"https://security.netapp.com/advisory/ntap-20220303-0006/"},{"name":"FEDORA-2022-82a9edac27","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/"},{"name":"FEDORA-2022-8cf0124add","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/"},{"name":"GLSA-202401-27","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202401-27"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T03:22:24.883Z"},"title":"CVE Program Container","references":[{"url":"https://hackerone.com/reports/1328463","tags":["x_transferred"]},{"url":"https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/","tags":["x_transferred"]},{"url":"https://security-tracker.debian.org/tracker/CVE-2021-41816","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20220303-0006/","tags":["x_transferred"]},{"name":"FEDORA-2022-82a9edac27","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/"},{"name":"FEDORA-2022-8cf0124add","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/"},{"name":"GLSA-202401-27","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202401-27"}]}]}}