First published: Sun Mar 20 2022(Updated: )
### Impact Improper header parsing. An attacker could sneak in a carriage return character (`\r`) and pass untrusted values in both the header names and values. ### Patches The issue is patched in 1.8.4 and 2.1.1. ### Workarounds There are no known workarounds. ### References * https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/guzzlehttp/psr7 | >=2<2.1.1<1.8.4 | |
Drupal Drupal | >=8.0.0<9.2.16 | |
Drupal Drupal | >=9.3.0<9.3.9 | |
Guzzlephp Psr-7 | <1.8.4 | |
Guzzlephp Psr-7 | >=2.0.0<2.1.1 | |
composer/guzzlehttp/psr7 | >=2.0.0<2.1.1 | 2.1.1 |
composer/guzzlehttp/psr7 | <1.8.4 | 1.8.4 |
ubuntu/php-guzzlehttp-psr7 | <1.4.2-0.1+ | 1.4.2-0.1+ |
ubuntu/php-guzzlehttp-psr7 | <1.8.3-1ubuntu0.1~ | 1.8.3-1ubuntu0.1~ |
ubuntu/php-guzzlehttp-psr7 | <1.8.4 | 1.8.4 |
debian/php-guzzlehttp-psr7 | 1.7.0-1+deb11u2 2.4.5-1 2.6.2-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24775 is a vulnerability in the guzzlehttp/psr7 library that allows improper parsing of HTTP headers, potentially allowing an attacker to pass untrusted values.
CVE-2022-24775 has a severity rating of 7.5 (High).
Versions prior to 1.8.4 and 2.1.1 of guzzlehttp/psr7 are affected by CVE-2022-24775.
To fix CVE-2022-24775, you should update guzzlehttp/psr7 to version 1.8.4 or 2.1.1, as these versions contain the necessary patches.
There are currently no known workarounds for CVE-2022-24775.