HTTP response splitting in CGI
High severity
GitHub Reviewed
Published
Nov 19, 2022
to the GitHub Advisory Database
•
Updated Jan 24, 2024
Package
Affected versions
>= 0.3.0, < 0.3.5
>= 0.2.0, < 0.2.2
< 0.1.0.2
Patched versions
0.3.5
0.2.2
0.1.0.2
Description
Published by the National Vulnerability Database
Nov 18, 2022
Published to the GitHub Advisory Database
Nov 19, 2022
Reviewed
Nov 24, 2022
Last updated
Jan 24, 2024
Ruby gem cgi.rb prior to versions 0.3.5, 0.2.2 and 0.1.0.2 allow HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This issue has been patched in versions 0.3.5, 0.2.2 and 0.1.0.2.
References