{"api_version":"1","generated_at":"2026-04-22T21:37:52+00:00","cve":"CVE-2019-16771","urls":{"html":"https://cve.report/CVE-2019-16771","api":"https://cve.report/api/cve/CVE-2019-16771.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-16771","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-16771"},"summary":{"title":"CVE-2019-16771","description":"Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2019-12-06 19:15:00","updated_at":"2019-12-16 14:19:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20","name":"https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"Merge pull request from GHSA-35fr-h7jr-hh86 · line/armeria@b597f7a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86","name":"https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86","refsource":"CONFIRM","tags":["Mailing List","Third Party Advisory"],"title":"CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') · Advisory · line/armeria · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-16771","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16771","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"16771","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linecorp","cpe5":"armeria","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"16771","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linecorp","cpe5":"armeria","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-16771","qid":"983135","title":"Java (maven) Security Update for com.linecorp.armeria:armeria (GHSA-24r8-fm9r-cpj2)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2019-16771","STATE":"PUBLIC","TITLE":"Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Armeria","version":{"version_data":[{"version_affected":"<","version_name":"< 0.97.0","version_value":"0.97.0"}]}}]},"vendor_name":"LINE"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')"}]}]},"references":{"reference_data":[{"name":"https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86","refsource":"CONFIRM","url":"https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86"},{"name":"https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20","refsource":"MISC","url":"https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20"}]},"source":{"advisory":"GHSA-35fr-h7jr-hh86","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2019-12-06 19:15:00","lastModifiedDate":"2019-12-16 14:19:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*","versionStartIncluding":"0.85.0","versionEndExcluding":"0.97.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"16771","Ordinal":"156493","Title":"CVE-2019-16771","CVE":"CVE-2019-16771","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"16771","Ordinal":"1","NoteData":"Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"16771","Ordinal":"2","NoteData":"2019-12-06","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"16771","Ordinal":"3","NoteData":"2019-12-11","Type":"Other","Title":"Modified"}]}}}