CVE-2019-16254 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Content spoofing |
Description | It has been discovered that Ruby before 2.4.8, 2.5.7 and 2.6.5 is vulnerable to HTTP response splitting in WEBrick bundled with Ruby. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This is the same issue as CVE-2017-17742. The previous fix was incomplete, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1040 | ruby2.5 | 2.5.6-1 | 2.5.7-1 | Medium | Fixed | FS#63977 |
AVG-1039 | ruby | 2.6.4-1 | 2.6.5-1 | Medium | Fixed | FS#63977 |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
02 Oct 2019 | ASA-201910-5 | AVG-1040 | ruby2.5 | Medium | multiple issues |
02 Oct 2019 | ASA-201910-2 | AVG-1039 | ruby | Medium | multiple issues |
References |
---|
https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/ |