CVE-2020-5216
Summary
| CVE | CVE-2020-5216 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-01-23 03:15:00 UTC |
| Updated | 2020-02-18 14:58:00 UTC |
| Description | In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Limited header injection when using dynamic overrides with user input · Advisory · github/secure_headers · GitHub |
CONFIRM |
github.com |
Exploit, Mitigation, Third Party Advisory |
| Merge pull request from GHSA-w978-rmpf-qmwg · github/secure_headers@3016957 · GitHub |
MISC |
github.com |
Patch |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 238742 Red Hat Update for Satellite 6.8 release (RHSA-2020:4366)