Lucene search

K
Ratpack ProjectRatpack

6 matches found

CVE
CVE
added 2019/10/18 3:15 a.m.220 views

CVE-2019-17513

An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.

7.5CVSS7.3AI score0.0125EPSS
CVE
CVE
added 2021/06/29 3:15 p.m.60 views

CVE-2021-29479

Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a user supplied X-Forwarded-Host header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the X-Forwarded-Host header as a cache key. Users are only vulnerable...

7CVSS6.4AI score0.00225EPSS
CVE
CVE
added 2021/06/29 7:15 p.m.60 views

CVE-2021-29481

Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, the default configuration of client side sessions results in unencrypted, but signed, data being set as cookie values. This means that if something sensitive goes into the session, it could be read by something with acc...

7.5CVSS6.7AI score0.00072EPSS
CVE
CVE
added 2021/06/29 7:15 p.m.59 views

CVE-2021-29485

Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If one's application does not use Ratpack's session m...

9.9CVSS8.8AI score0.02483EPSS
CVE
CVE
added 2021/06/29 7:15 p.m.56 views

CVE-2021-29480

Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, the client side session module uses the application startup time as the signing key by default. This means that if an attacker can determine this time, and if encryption is not also used (which is recommended, but is no...

4.4CVSS4.1AI score0.00089EPSS
CVE
CVE
added 2019/05/07 7:29 a.m.52 views

CVE-2019-11808

Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.

4.3CVSS4.4AI score0.00297EPSS