Impact
The Ruby URI module allows classes to manipulate Uniform Resource Identifiers. In legacy versions, the + operator concatenated two URIs and inadvertently propagated the user name and password from the original URI to the resulting URI. This behavior violates RFC3986 and causes sensitive credentials to be exposed in logs or other logs, making applications vulnerable to credential leakage.
Affected Systems
The issue affects the Ruby URI gem versions 0.12.4 and earlier, 0.13.2 and earlier, and 1.0.3 and earlier—bundled in Ruby 3.2, 3.3, and 3.4 series respectively. Versions 0.12.5, 0.13.3, and 1.0.4 and later contain the fix.
Risk and Exploitability
The CVSS score is 2.1 and the EPSS score is less than 1%; the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an application that concatenates URIs containing credentials via the + operator, which may be performed by code executing with trusted privileges. The impact is limited to information disclosure of credentials rather than code execution or denial of service.
OpenCVE Enrichment
Github GHSA