icon

We found results for “

CVE-2017-17742

Good to know:

icon

Date: April 2, 2018

Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.

Language: Ruby

Severity Score

Related Resources (25)

Severity Score

Weakness Type (CWE)

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-113

Top Fix

icon

Upgrade Version

Upgrade to version PactNet.Windows - no_fix;PactNet - 2.0.8-beta;PactNet.Linux.x86 - no_fix;ruby - 2.4.4;PactNet-Windows - no_fix;NC-NougatUI - no_fix;PactNet.Linux.x64 - no_fix;PactNet.OSX - no_fix;jekyll-standalone - no_fix;PactNet-OSX - no_fix;logstash-binary - no_fix;Ruby.Compass - 0.12.2.3;PactNet-Linux-x64 - no_fix;NougatUI - no_fix;GallioBundle - no_fix;PactNet-Linux-x86 - no_fix;org.jruby:jruby-stdlib:1.7.7

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): PARTIAL
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us