Описание
Improper Input Validation in guzzlehttp/psr7
Impact
Improper header parsing. An attacker could sneak in a carriage return character (\r) and pass untrusted values in both the header names and values.
Patches
The issue is patched in 1.8.4 and 2.1.1.
Workarounds
There are no known workarounds.
References
Ссылки
- https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
- https://nvd.nist.gov/vuln/detail/CVE-2022-24775
- https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1
- https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc
- https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2022-24775.yaml
- https://www.drupal.org/sa-core-2022-006
- https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
Пакеты
guzzlehttp/psr7
< 1.8.4
1.8.4
guzzlehttp/psr7
>= 2.0.0, < 2.1.1
2.1.1
Связанные уязвимости
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8 ...
Уязвимость библиотеки обработки HTTP-сообщений PSR-7 guzzlehttp/psr7, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на целостность защищаемой информации