An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
References
Link | Resource |
---|---|
https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae | Patch |
https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d | Patch |
https://github.com/ratpack/ratpack/releases/tag/v1.7.5 | Release Notes Third Party Advisory |
https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j | Third Party Advisory |
https://ratpack.io/versions/1.7.5 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2019-10-18 03:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-17513
Mitre link : CVE-2019-17513
CVE.ORG link : CVE-2019-17513
JSON object : View
Products Affected
ratpack_project
- ratpack
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')