Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-5216
HistoryJan 23, 2020 - 2:30 a.m.

CVE-2020-5216 Limited header injection when using dynamic overrides with user input in RubyGems secure_headers

2020-01-2302:30:15
CWE-113
GitHub_M
www.cve.org
3

CVSS3

4.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

38.5%

In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.

CNA Affected

[
  {
    "product": "secure_headers",
    "vendor": "Twitter",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.9.0"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.2.0"
      },
      {
        "status": "affected",
        "version": ">= 6.0.0, < 6.3.0"
      }
    ]
  }
]

CVSS3

4.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

38.5%