An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0708 An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
Github GHSA Github GHSA GHSA-mvqp-q37c-wf9j io.ratpack:ratpack-core vulnerable to Improper Neutralization of Special Elements in Output ('Injection')
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:40:15.853Z

Reserved: 2019-10-11T00:00:00

Link: CVE-2019-17513

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-18T03:15:09.897

Modified: 2024-11-21T04:32:25.217

Link: CVE-2019-17513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.