Описание
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
Ссылки
- Patch
- Patch
- Release NotesThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- Patch
- Patch
- Release NotesThird Party Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.5 (исключая)
cpe:2.3:a:ratpack_project:ratpack:*:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.0125
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-74
Связанные уязвимости
CVSS3: 7.5
github
больше 6 лет назад
io.ratpack:ratpack-core vulnerable to Improper Neutralization of Special Elements in Output ('Injection')
EPSS
Процентиль: 79%
0.0125
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-74