Lucene search

K
githubGitHub Advisory DatabaseGHSA-VC47-6RQG-C7F5
HistoryNov 19, 2022 - 12:30 a.m.

HTTP response splitting in CGI

2022-11-1900:30:55
CWE-74
CWE-436
GitHub Advisory Database
github.com
26
http response splitting
cgi
ruby gem
http header injection
security issue
version 0.3.5
version 0.2.2
version 0.1.0.2
patched.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

74.8%

Ruby gem cgi.rb prior to versions 0.3.5, 0.2.2 and 0.1.0.2 allow HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This issue has been patched in versions 0.3.5, 0.2.2 and 0.1.0.2.

Affected configurations

Vulners
Node
cgi_rescuecgi_web_mailerRange<0.1.0.2
OR
cgi_rescuecgi_web_mailerRange<0.2.2
OR
cgi_rescuecgi_web_mailerRange<0.3.5
CPENameOperatorVersion
cgilt0.1.0.2
cgilt0.2.2
cgilt0.3.5

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

74.8%