Lucene search

K
cveGitHub_MCVE-2023-29530
HistoryApr 24, 2023 - 8:15 p.m.

CVE-2023-29530

2023-04-2420:15:08
CWE-20
GitHub_M
web.nvd.nist.gov
67
laminas diactoros
cve-2023-29530
http message
denial of service
security patch

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

30.7%

Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling withHeader().

Affected configurations

Nvd
Vulners
Node
getlaminaslaminas-diactorosRange<2.18.1
OR
getlaminaslaminas-diactorosMatch2.19.0
OR
getlaminaslaminas-diactorosMatch2.20.0
OR
getlaminaslaminas-diactorosMatch2.21.0
OR
getlaminaslaminas-diactorosMatch2.22.0
OR
getlaminaslaminas-diactorosMatch2.23.0
OR
getlaminaslaminas-diactorosMatch2.24.0
OR
getlaminaslaminas-diactorosMatch2.25.0
OR
guzzlephppsr-7Range<1.9.1
OR
guzzlephppsr-7Range2.0.02.4.5
Node
fedoraprojectfedoraMatch38
VendorProductVersionCPE
getlaminaslaminas-diactoros*cpe:2.3:a:getlaminas:laminas-diactoros:*:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.19.0cpe:2.3:a:getlaminas:laminas-diactoros:2.19.0:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.20.0cpe:2.3:a:getlaminas:laminas-diactoros:2.20.0:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.21.0cpe:2.3:a:getlaminas:laminas-diactoros:2.21.0:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.22.0cpe:2.3:a:getlaminas:laminas-diactoros:2.22.0:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.23.0cpe:2.3:a:getlaminas:laminas-diactoros:2.23.0:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.24.0cpe:2.3:a:getlaminas:laminas-diactoros:2.24.0:*:*:*:*:*:*:*
getlaminaslaminas-diactoros2.25.0cpe:2.3:a:getlaminas:laminas-diactoros:2.25.0:*:*:*:*:*:*:*
guzzlephppsr-7*cpe:2.3:a:guzzlephp:psr-7:*:*:*:*:*:*:*:*
fedoraprojectfedora38cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "laminas",
    "product": "laminas-diactoros",
    "versions": [
      {
        "version": "< 2.18.1",
        "status": "affected"
      },
      {
        "version": "= 2.19.0",
        "status": "affected"
      },
      {
        "version": "= 2.20.0",
        "status": "affected"
      },
      {
        "version": "= 2.21.0",
        "status": "affected"
      },
      {
        "version": "= 2.22.0",
        "status": "affected"
      },
      {
        "version": "= 2.23.0",
        "status": "affected"
      },
      {
        "version": "= 2.24.0",
        "status": "affected"
      },
      {
        "version": "= 2.25.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

30.7%