Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-5216

Опубликовано: 23 янв. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 4.4

Описание

In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

6.3.1-1
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

not-affected

6.3.1-1
esm-apps/noble

not-affected

6.3.1-1
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

not-affected

6.3.1-1

Показывать по

5 Medium

CVSS2

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
redhat
около 6 лет назад

In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.

CVSS3: 4.4
nvd
около 6 лет назад

In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.

CVSS3: 4.4
debian
около 6 лет назад

In Secure Headers (RubyGem secure_headers), a directive injection vuln ...

CVSS3: 4.4
github
около 6 лет назад

Limited header injection when using dynamic overrides with user input in RubyGems secure_headers

5 Medium

CVSS2

4.4 Medium

CVSS3