Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
Related vulnerabilities
GSD-2011-3186
Vulnerability from gsd - Updated: 2011-08-16 00:00Details
A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow
a remote attacker to inject arbitrary HTTP headers into a response due to
insufficient sanitization of the values provided for response content types.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2011-3186",
"description": "CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.",
"id": "GSD-2011-3186",
"references": [
"https://www.suse.com/security/cve/CVE-2011-3186.html",
"https://www.debian.org/security/2011/dsa-2301"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionpack",
"purl": "pkg:gem/actionpack"
}
}
],
"aliases": [
"CVE-2011-3186",
"OSVDB-74616"
],
"details": "A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow\na remote attacker to inject arbitrary HTTP headers into a response due to\ninsufficient sanitization of the values provided for response content types.\n",
"id": "GSD-2011-3186",
"modified": "2011-08-16T00:00:00.000Z",
"published": "2011-08-16T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 4.3,
"type": "CVSS_V2"
}
],
"summary": "Response Splitting Vulnerability in Ruby on Rails"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3186",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
},
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=732156",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732156"
},
{
"name": "FEDORA-2011-11567",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
},
{
"name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
},
{
"name": "DSA-2301",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2301"
},
{
"name": "45921",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45921"
},
{
"name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
},
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
},
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
},
{
"name": "https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9",
"refsource": "CONFIRM",
"url": "https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9"
},
{
"name": "[rubyonrails-security] 20110816 Response Splitting Vulnerability in Ruby on Rails",
"refsource": "MLIST",
"url": "http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source\u0026output=gplain"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2011-3186",
"cvss_v2": 4.3,
"date": "2011-08-16",
"description": "A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow\na remote attacker to inject arbitrary HTTP headers into a response due to\ninsufficient sanitization of the values provided for response content types.\n",
"framework": "rails",
"gem": "actionpack",
"osvdb": 74616,
"patched_versions": [
"\u003e= 2.3.13"
],
"title": "Response Splitting Vulnerability in Ruby on Rails",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=2.3.0.alpha0 \u003c2.3.13",
"affected_versions": "All versions starting from 2.3.0.alpha0 before 2.3.13",
"credit": "Brent Miller, Aaron Patterson",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-937",
"CWE-94"
],
"date": "2019-08-08",
"description": "A response splitting flaw can allow a remote attacker to inject arbitrary HTTP headers into a response due to insufficient sanitization of the values provided for response content types.",
"fixed_versions": [
"2.3.13"
],
"identifier": "CVE-2011-3186",
"identifiers": [
"CVE-2011-3186"
],
"not_impacted": "All versions before 2.3.0.alpha0, all versions starting from 2.3.13",
"package_slug": "gem/actionpack",
"pubdate": "2011-08-29",
"solution": "Upgrade to version 2.3.13 or above.",
"title": "Response Splitting Vulnerability in Ruby on Rails",
"urls": [
"https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9#diff-62558f372a46058cbab9309494d0fbb1",
"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/OSVDB-74616.yml",
"https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g"
],
"uuid": "7e657ac7-35ca-4168-98f0-d32af782621f"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3186"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[rubyonrails-security] 20110816 Response Splitting Vulnerability in Ruby on Rails",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source\u0026output=gplain"
},
{
"name": "[oss-security] 20110820 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
},
{
"name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/11"
},
{
"name": "https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9"
},
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
},
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
},
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
},
{
"name": "[oss-security] 20110817 CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=732156",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732156"
},
{
"name": "FEDORA-2011-11567",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html"
},
{
"name": "45921",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/45921"
},
{
"name": "DSA-2301",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2301"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2019-08-08T14:38Z",
"publishedDate": "2011-08-29T18:55Z"
}
}
}