Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
2019-11-26T18:15:15.210
2024-11-21T04:30:23.863
Modified
CVSSv3.1: 5.3 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ruby-lang | ruby | ≤ 2.3.0 | Yes |
Application | ruby-lang | ruby | ≤ 2.4.7 | Yes |
Application | ruby-lang | ruby | ≤ 2.5.6 | Yes |
Application | ruby-lang | ruby | ≤ 2.6.4 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |