clearance 1.15.0

1 security vulnerability found in version 1.15.0

Open Redirect in clearance

high severity CVE-2021-23435
high severity CVE-2021-23435
Patched versions: >= 2.5.0

This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com).

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.