Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-29530
HistoryApr 24, 2023 - 7:34 p.m.

CVE-2023-29530 Laminas Diactoros vulnerable to HTTP Multiline Header Termination

2023-04-2419:34:40
CWE-20
GitHub_M
www.cve.org
1
laminas diactoros
http
multiline
vulnerable
header termination
denial of service
patched
security advisory

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

30.9%

Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling withHeader().

CNA Affected

[
  {
    "vendor": "laminas",
    "product": "laminas-diactoros",
    "versions": [
      {
        "version": "< 2.18.1",
        "status": "affected"
      },
      {
        "version": "= 2.19.0",
        "status": "affected"
      },
      {
        "version": "= 2.20.0",
        "status": "affected"
      },
      {
        "version": "= 2.21.0",
        "status": "affected"
      },
      {
        "version": "= 2.22.0",
        "status": "affected"
      },
      {
        "version": "= 2.23.0",
        "status": "affected"
      },
      {
        "version": "= 2.24.0",
        "status": "affected"
      },
      {
        "version": "= 2.25.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

30.9%