Sha256: 7c5028ff122b936538f5425e40156bba4624086c254a9d01fd0735e40e869ef3

Contents?: true

Size: 795 Bytes

Versions: 3

Compression:

Stored size: 795 Bytes

Contents

---
engine: ruby
cve: 2017-17742
url: https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
title: HTTP response splitting in WEBrick
date: 2018-03-28
description: |
  There is an HTTP response splitting vulnerability in WEBrick bundled with Ruby.

  If a script accepts an external input and outputs it without modification as
  a part of HTTP responses, an attacker can use newline characters to deceive
  the clients that the HTTP response header is stopped at there, and can inject
  fake HTTP responses after the newline characters to show malicious contents
  to the clients.

  All users running an affected release should upgrade immediately.
patched_versions:
  - "~> 2.2.10"
  - "~> 2.3.7"
  - "~> 2.4.4"
  - "~> 2.5.1"
  - "> 2.6.0-preview1"

Version data entries

3 entries across 3 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2017-17742.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/CVE-2017-17742.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2017-17742.yml