Lucene search

K
cveGitHub_MCVE-2020-5216
HistoryJan 23, 2020 - 3:15 a.m.

CVE-2020-5216

2020-01-2303:15:10
CWE-113
CWE-74
GitHub_M
web.nvd.nist.gov
109
cve-2020-5216
secure headers
rubygem
directive injection
vulnerability
security update
header injection

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

AI Score

5.9

Confidence

High

EPSS

0.001

Percentile

38.5%

In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.

Affected configurations

Nvd
Vulners
Node
twittersecure_headersRange<3.9.0ruby
OR
twittersecure_headersRange5.0.05.2.0ruby
OR
twittersecure_headersRange6.0.06.3.0ruby
VendorProductVersionCPE
twittersecure_headers*cpe:2.3:a:twitter:secure_headers:*:*:*:*:*:ruby:*:*

CNA Affected

[
  {
    "product": "secure_headers",
    "vendor": "Twitter",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.9.0"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.2.0"
      },
      {
        "status": "affected",
        "version": ">= 6.0.0, < 6.3.0"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

AI Score

5.9

Confidence

High

EPSS

0.001

Percentile

38.5%