HTTP Response Splitting Vulnerability in Ruby WEBrick
CVE-2019-16254

5.3MEDIUM

Key Information:

Vendor

Ruby-lang

Status
Vendor
CVE Published:
26 November 2019

What is CVE-2019-16254?

The WEBrick server in Ruby is susceptible to HTTP Response Splitting due to the way it processes untrusted input within response headers. Attackers may exploit this vulnerability by injecting newline characters, effectively allowing them to deceive clients by altering header responses. This vulnerability stems from an incomplete resolution of an earlier related issue, which failed to address isolated CR (Carriage Return) or LF (Line Feed) characters. As a result, developers must ensure robust input validation to mitigate the risk of such attacks.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.