GHSA-35fr-h7jr-hh86 – com.linecorp.armeria:armeria
Package
Manager: maven
Name: com.linecorp.armeria:armeria
Vulnerable Version: >=0.85.0 <0.97.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. ### Impact 1. Cross-User Defacement 2. Cache Poisoning 3. Cross-Site Scripting (XSS) 4. Page Hijacking ### Root Cause The root cause is due to the usage of Netty without the HTTP header validation. https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23 ### Patches This vulnerability has been patched in 0.97.0. ### References [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](https://github.com/line/armeria/issues)
Metadata
Created: 2019-12-06T18:55:47Z
Modified: 2021-04-27T18:03:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-35fr-h7jr-hh86/GHSA-35fr-h7jr-hh86.json
CWE IDs: ["CWE-113", "CWE-74"]
Alternative ID: N/A
Finding: F184
Auto approve: 1