An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
References
Link | Resource |
---|---|
https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae | Patch |
https://github.com/ratpack/ratpack/releases/tag/v1.7.5 | Release Notes Third Party Advisory |
https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j | Third Party Advisory |
https://ratpack.io/versions/1.7.5 | Vendor Advisory |
https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d | Patch |
Configurations
Information
Published : 2019-10-17 20:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-17513
Mitre link : CVE-2019-17513
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
ratpack_project
- ratpack