CVE-2025-27221
ADVISORY - githubSummary
There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem.
Details
The methods URI#join, URI#merge, and URI#+ retained userinfo, such as user:password, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur.
Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later.
Affected versions
uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2.
Credits
Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability.
Common Weakness Enumeration (CWE)
Improper Removal of Sensitive Information Before Storage or Transfer
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
Exposure of Sensitive Information to an Unauthorized Actor
Improper Removal of Sensitive Information Before Storage or Transfer
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
Improper Removal of Sensitive Information Before Storage or Transfer
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in