First published: Mon Apr 17 2023(Updated: )
### Impact Improper header parsing. An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`. ### Patches The issue is patched in 1.9.1 and 2.4.5. ### Workarounds There are no known workarounds. ### References * https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/guzzlehttp/psr7 | >=2<2.4.5<1.9.1 | |
Guzzlephp Psr-7 | <1.9.1 | |
Guzzlephp Psr-7 | >=2.0.0<2.4.5 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
composer/guzzlehttp/psr7 | >=2.0.0<2.4.5 | 2.4.5 |
composer/guzzlehttp/psr7 | <1.9.1 | 1.9.1 |
ubuntu/php-guzzlehttp-psr7 | <1.4.2-0.1+ | 1.4.2-0.1+ |
ubuntu/php-guzzlehttp-psr7 | <1.8.3-1ubuntu0.1~ | 1.8.3-1ubuntu0.1~ |
ubuntu/php-guzzlehttp-psr7 | <2.4.5 | 2.4.5 |
ubuntu/php-nyholm-psr7 | <1.5.0-1ubuntu0.1~ | 1.5.0-1ubuntu0.1~ |
ubuntu/php-nyholm-psr7 | <1.6.1 | 1.6.1 |
debian/php-guzzlehttp-psr7 | 1.7.0-1+deb11u2 2.4.5-1 2.6.2-3 | |
debian/php-nyholm-psr7 | 1.3.2-2+deb11u1 1.5.1-2 1.8.1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29197 is a vulnerability in the guzzlehttp/psr7 library that allows for improper header validation, potentially enabling an attacker to inject malicious content into HTTP headers.
CVE-2023-29197 affects versions up to 2.4.5 and 1.9.1 of the guzzlehttp/psr7 library, allowing for improper parsing of newline characters in header names and values.
CVE-2023-29197 has a severity rating of 7.5, which is classified as high.
To fix CVE-2023-29197, update the guzzlehttp/psr7 library to version 2.4.6 or higher.
Yes, you can find more information about CVE-2023-29197 at the following references: - Advisory: https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw - CVE Entry: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775 - Advisory: https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96