CVE-2019-16254
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2019-16254. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
Available Exploits
Related News
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: May 1, 2023
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
🚨 Cache Poisoning & Request Smuggling — A Technical Breakdown By CyberDudeBivash – Ruthless, Engineering-Grade Threat Intel https://preview.redd.it/duyiknn3qsjf1.png?width=1536&format=png&auto=webp&s=d1b9dbc5c915affdcf40aa292c8a13f2398b1b1b 1. Introduction Modern web applications rely heavily on **reverse proxies, CDNs, and caching layers** to deliver fast, scalable experiences. But attackers exploit the **mismatch between how different systems parse HTTP requests** to …