An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0708 | An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur. |
Github GHSA |
GHSA-mvqp-q37c-wf9j | io.ratpack:ratpack-core vulnerable to Improper Neutralization of Special Elements in Output ('Injection') |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:40:15.853Z
Reserved: 2019-10-11T00:00:00
Link: CVE-2019-17513
No data.
Status : Modified
Published: 2019-10-18T03:15:09.897
Modified: 2024-11-21T04:32:25.217
Link: CVE-2019-17513
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA