7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.003 Low
EPSS
Percentile
65.6%
Improper header parsing. An attacker could sneak in a newline (\n
) into both the header names and values. While the specification states that \r\n\r\n
is used to terminate the header list, many servers in the wild will also accept \n\n
.
The issue is patched in 1.6.1.
There are no known workarounds.
CPE | Name | Operator | Version |
---|---|---|---|
nyholm/psr7 | eq | 1.1.0 | |
nyholm/psr7 | eq | 1.6.0 | |
nyholm/psr7 | eq | 1.2.0 | |
nyholm/psr7 | eq | 0.3.0 | |
nyholm/psr7 | eq | 1.3.0 | |
nyholm/psr7 | eq | 1.3.1 | |
nyholm/psr7 | eq | 0.2.1 | |
nyholm/psr7 | eq | 1.4.1 | |
nyholm/psr7 | eq | 1.5.0 | |
nyholm/psr7 | eq | 1.0.0 |
github.com/FriendsOfPHP/security-advisories/blob/master/nyholm/psr7/2023-04-17.yaml
github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
github.com/Nyholm/psr7
github.com/Nyholm/psr7/security/advisories/GHSA-wjfc-pgfp-pv9c
nvd.nist.gov/vuln/detail/CVE-2023-29197