"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-18 03:00:58 +00:00
parent 3fc36ddc26
commit 247cf31085
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8

View File

@ -0,0 +1,82 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-17513",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d",
"refsource": "MISC",
"name": "https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d"
},
{
"url": "https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae",
"refsource": "MISC",
"name": "https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae"
},
{
"url": "https://ratpack.io/versions/1.7.5",
"refsource": "MISC",
"name": "https://ratpack.io/versions/1.7.5"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j",
"url": "https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/ratpack/ratpack/releases/tag/v1.7.5",
"url": "https://github.com/ratpack/ratpack/releases/tag/v1.7.5"
}
]
}
}