Логотип exploitDog
bind:CVE-2020-5247
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-5247

Количество 12

Количество 12

ubuntu логотип

CVE-2020-5247

почти 6 лет назад

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2020-5247

почти 6 лет назад

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-5247

почти 6 лет назад

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2020-5247

больше 5 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-5247

почти 6 лет назад

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application us ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-84j7-475p-hp8v

почти 6 лет назад

HTTP Response Splitting in Puma

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2020-04073

почти 6 лет назад

Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с некорректной нейтрализацией символов CR, LF, /r и /n перед внесением данных в HTTP-заголовки, позволяющая нарушителю осуществлять межсайтовые сценарные атаки

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2000-1

около 5 лет назад

Security update for rmt-server

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1993-1

около 5 лет назад

Security update for rmt-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3160-1

больше 5 лет назад

Security update for rmt-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3147-1

больше 5 лет назад

Security update for rmt-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3036-1

больше 5 лет назад

Security update for rmt-server

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-5247

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
redhat логотип
CVE-2020-5247

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.

CVSS3: 5.3
2%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-5247

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
msrc логотип
CVSS3: 7.5
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-5247

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application us ...

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
github логотип
GHSA-84j7-475p-hp8v

HTTP Response Splitting in Puma

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
fstec логотип
BDU:2020-04073

Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с некорректной нейтрализацией символов CR, LF, /r и /n перед внесением данных в HTTP-заголовки, позволяющая нарушителю осуществлять межсайтовые сценарные атаки

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2000-1

Security update for rmt-server

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1993-1

Security update for rmt-server

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3160-1

Security update for rmt-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3147-1

Security update for rmt-server

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3036-1

Security update for rmt-server

больше 5 лет назад

Уязвимостей на страницу