Loading HuntDB...

CVE-2019-16254

UNKNOWN
Published 2019-11-26T00:00:00
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2019-16254. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-w9fp-2996-hhwx

Advisory Details

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: May 1, 2023

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

1 post
Reddit 1 month, 1 week ago
Immediate_Gold9789
Exploit Payload

🚨 Cache Poisoning & Request Smuggling — A Technical Breakdown By CyberDudeBivash – Ruthless, Engineering-Grade Threat Intel https://preview.redd.it/duyiknn3qsjf1.png?width=1536&format=png&auto=webp&s=d1b9dbc5c915affdcf40aa292c8a13f2398b1b1b 1. Introduction Modern web applications rely heavily on **reverse proxies, CDNs, and caching layers** to deliver fast, scalable experiences. But attackers exploit the **mismatch between how different systems parse HTTP requests** to …

1
1.0
View Original High Risk

References

Published: 2019-11-26T00:00:00
Last Modified: 2024-08-05T01:10:41.699Z
Copied to clipboard!