guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3705-1 | php-guzzlehttp-psr7 security update |
EUVD |
EUVD-2022-1513 | guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds. |
Github GHSA |
GHSA-q7rv-6hp3-vh96 | Improper Input Validation in guzzlehttp/psr7 |
Ubuntu USN |
USN-6670-1 | php-guzzlehttp-psr7 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:45:20.759Z
Reserved: 2022-02-10T00:00:00.000Z
Link: CVE-2022-24775
Updated: 2024-08-03T04:20:50.472Z
Status : Modified
Published: 2022-03-21T19:15:11.677
Modified: 2024-11-21T06:51:04.337
Link: CVE-2022-24775
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN