First published: Fri Oct 25 2019(Updated: )
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby25-ruby | <0:2.5.9-9.el7 | 0:2.5.9-9.el7 |
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
Ruby-lang Ruby | <=2.3.0 | |
Ruby-lang Ruby | >=2.4.0<=2.4.7 | |
Ruby-lang Ruby | >=2.5.0<=2.5.6 | |
Ruby-lang Ruby | >=2.6.0<=2.6.4 | |
Debian Debian Linux | =8.0 | |
redhat/ruby | <2.4.8 | 2.4.8 |
redhat/ruby | <2.5.7 | 2.5.7 |
redhat/ruby | <2.6.5 | 2.6.5 |
redhat/ruby | <2.7.0 | 2.7.0 |
ubuntu/jruby | <1.5.6-9+ | 1.5.6-9+ |
ubuntu/ruby2.3 | <2.3.1-2~ubuntu16.04.14 | 2.3.1-2~ubuntu16.04.14 |
ubuntu/ruby2.5 | <2.5.1-1ubuntu1.6 | 2.5.1-1ubuntu1.6 |
ubuntu/ruby2.5 | <2.5.5-1ubuntu1.1 | 2.5.5-1ubuntu1.1 |
ubuntu/ruby2.5 | <2.5.5-4ubuntu2.1 | 2.5.5-4ubuntu2.1 |
ubuntu/ruby2.5 | <2.5.7-1 | 2.5.7-1 |
debian/jruby | 9.3.9.0+ds-8 9.4.8.0+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-16254 is a vulnerability in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 that allows HTTP Response Splitting.
If an attacker inserts untrusted input into the response header of a program using WEBrick, they can exploit the vulnerability to insert a newline character and inject malicious content to deceive clients.
CVE-2019-16254 has a severity rating of medium with a CVSS score of 5.3.
Ruby versions 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 are affected by CVE-2019-16254.
To fix CVE-2019-16254, update Ruby to version 2.4.8, 2.5.7, or 2.6.5 or later as appropriate for your version.