Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-5216
HistoryJan 23, 2020 - 12:00 a.m.

CVE-2020-5216

2020-01-2300:00:00
ubuntu.com
ubuntu.com
20

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

EPSS

0.001

Percentile

38.5%

In Secure Headers (RubyGem secure_headers), a directive injection
vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If
user-supplied input was passed into
append/override_content_security_policy_directives, a newline could be
injected leading to limited header injection. Upon seeing a newline in the
header, rails will silently create a new Content-Security-Policy header
with the remaining value of the original string. It will continue to create
new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and
3.9.0.

Bugs

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

EPSS

0.001

Percentile

38.5%