HTTP Response Splitting Vulnerability in Ruby Affected WEBrick Server
CVE-2017-17742

5.3MEDIUM

Key Information:

Vendor

Ruby-lang

Status
Vendor
CVE Published:
3 April 2018

What is CVE-2017-17742?

The vulnerability allows an attacker to exploit HTTP Response Splitting through crafted key-value pairs in the HTTP response of the WEBrick server. This could potentially lead to other security risks such as cache poisoning or cross-site scripting (XSS), exposing users to malicious content. It is essential for users of Ruby, particularly in versions prior to the specified patches, to review their server configurations and update to secure versions to prevent exploitation.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.