Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-24753
HistoryFeb 01, 2024 - 4:09 p.m.

CVE-2024-24753 Bref Multiple Value Headers Not Supported in ApiGatewayFormatV2

2024-02-0116:09:55
CWE-436
GitHub_M
www.cve.org
3
bref
api gateway v2
multiple value headers
application security
patch
aws lambda
php
cve-2024-24753
vulnerability

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

17.0%

Bref enable serverless PHP on AWS Lambda. When Bref is used in combination with an API Gateway with the v2 format, it does not handle multiple values headers. If PHP generates a response with two headers having the same key but different values only the latest one is kept. If an application relies on multiple headers with the same key being set for security reasons, then Bref would lower the application security. For example, if an application sets multiple Content-Security-Policy headers, then Bref would just reflect the latest one. This vulnerability is patched in 2.1.13.

CNA Affected

[
  {
    "vendor": "brefphp",
    "product": "bref",
    "versions": [
      {
        "version": "< 2.1.13",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

17.0%

Related for CVELIST:CVE-2024-24753