Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:GUZZLEHTTP:PSR7:CVE-2023-29197
HistoryApr 17, 2023 - 4:00 p.m.

Improper header validation

2023-04-1716:00:00
OpenJS Foundation
github.com
7
improper header parsing
security impact
newline injection
patched versions
specification violation
server acceptance
no workaround
rfc 7230

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

Low

EPSS

0.003

Percentile

69.9%

Description Impact Improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. Patches The issue is patched in 1.9.1 and 2.4.5. Workarounds There are no known workarounds. References https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4

Affected configurations

Vulners
Node
guzzlehttppsr7Range<2.4.5
VendorProductVersionCPE
guzzlehttppsr7*cpe:2.3:a:guzzlehttp:psr7:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

Low

EPSS

0.003

Percentile

69.9%