Vulnerability Details : CVE-2019-16771
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2019-16771
- cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-16771
0.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-16771
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
3.9
|
2.5
|
NIST | |
4.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
2.2
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2019-16771
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2019-16771
-
https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') · Advisory · line/armeria · GitHubMailing List;Third Party Advisory
-
https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20
Merge pull request from GHSA-35fr-h7jr-hh86 · line/armeria@b597f7a · GitHubPatch;Vendor Advisory
Jump to