clearance 1.15.0
1 security vulnerability
found in version
1.15.0
Open Redirect in clearance
high severity CVE-2021-23435
high severity
CVE-2021-23435
Patched versions:
>= 2.5.0
This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com).
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
No license issues detected.
This gem version has a license in the gemspec.
This gem version is available.
This gem version has not been yanked and is still available for usage.