VYPR
High severity8.8NVD Advisory· Published Jul 13, 2017· Updated May 13, 2026

CVE-2017-11173

CVE-2017-11173

Description

Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
rack-corsRubyGems
< 0.4.10.4.1

Affected products

2

Patches

1
42ebe6caa8e8

Add end string anchor to string origin def

https://github.com/cyu/rack-corsCalvin YuOct 13, 2015via ghsa
1 file changed · +1 1
  • lib/rack/cors.rb+1 1 modified
    @@ -253,7 +253,7 @@ def origins(*args, &blk)
                      /^https?:\/\//,
                      'file://'        then n
                 when '*'              then @public_resources = true; n
    -            else                  Regexp.compile("^[a-z][a-z0-9.+-]*:\\\/\\\/#{Regexp.quote(n)}")
    +            else                  Regexp.compile("^[a-z][a-z0-9.+-]*:\\\/\\\/#{Regexp.quote(n)}$")
                 end
               end.flatten
               @origins.push(blk) if blk
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.