In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-0281 In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.
Github GHSA Github GHSA GHSA-w978-rmpf-qmwg Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T08:22:08.681Z

Reserved: 2020-01-02T00:00:00

Link: CVE-2020-5216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-23T03:15:10.683

Modified: 2024-11-21T05:33:41.870

Link: CVE-2020-5216

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-01-22T00:00:00Z

Links: CVE-2020-5216 - Bugzilla

cve-icon OpenCVE Enrichment

No data.