{"id":"CVE-2008-5189","details":"CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.","aliases":["GHSA-jmgf-p46x-982h"],"modified":"2026-04-10T03:40:20.290803Z","published":"2008-11-21T12:00:00Z","references":[{"type":"ADVISORY","url":"http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing"},{"type":"ARTICLE","url":"http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk"},{"type":"FIX","url":"http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d"},{"type":"FIX","url":"http://www.securityfocus.com/bid/32359"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"}],"schema_version":"1.7.5"}