Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade icalendar to version 2.12.2 or higher.
icalendar is an Implements the iCalendar specification (RFC-5545) in Ruby. This allows for the generation and parsing of .ics files, which are used by a variety of calendaring applications.
Affected versions of this package are vulnerable to CRLF Injection via the serialization process of URI property values due to improper sanitization of input. An attacker can inject arbitrary calendar lines into generated ICS files by supplying input containing CRLF characters, which are embedded directly into the output and interpreted as new properties or components by downstream calendar clients.
require "icalendar/value"
require "icalendar/values/uri"
v = Icalendar::Values::Uri.new("https://a.example/ok\r\nATTENDEE:mailto:evil@example.com")
puts v.to_ical(Icalendar::Values::Text)