GSD-2020-7622
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-7622",
"description": "This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn\u0027t being abused for HTTP Response Splitting.",
"id": "GSD-2020-7622"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-7622"
],
"details": "This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn\u0027t being abused for HTTP Response Splitting.",
"id": "GSD-2020-7622",
"modified": "2023-12-13T01:21:51.817916Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2021-08-02T07:51:16.381739Z",
"ID": "CVE-2020-7622",
"STATE": "PUBLIC",
"TITLE": "HTTP Response Splitting"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "io.jooby:jooby-netty",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "1.6.9"
},
{
"version_affected": "\u003e=",
"version_value": "2.0.0"
},
{
"version_affected": "\u003c",
"version_value": "2.2.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jonathan Leitschuh"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn\u0027t being abused for HTTP Response Splitting."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HTTP Response Splitting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249"
},
{
"name": "https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4",
"refsource": "MISC",
"url": "https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4"
},
{
"name": "https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j",
"refsource": "MISC",
"url": "https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,2.2.1)",
"affected_versions": "All versions before 2.2.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2021-08-03",
"description": "This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn\u0027t being abused for HTTP Response Splitting.",
"fixed_versions": [
"2.2.1"
],
"identifier": "CVE-2020-7622",
"identifiers": [
"GHSA-gv3v-92v6-m48j",
"CVE-2020-7622"
],
"not_impacted": "All versions starting from 2.2.1",
"package_slug": "maven/io.jooby/jooby-netty",
"pubdate": "2020-04-03",
"solution": "Upgrade to version 2.2.1 or above.",
"title": "Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby (\u0027HTTP Response Splitting)",
"urls": [
"https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j",
"https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4",
"https://nvd.nist.gov/vuln/detail/CVE-2020-7622",
"https://github.com/advisories/GHSA-gv3v-92v6-m48j"
],
"uuid": "d5e24b40-af2f-470c-b4bf-55ab81f53fd6"
},
{
"affected_range": "[2.0.0,2.2.1)",
"affected_versions": "All versions starting from 2.0.0 before 2.2.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-444",
"CWE-937"
],
"date": "2023-07-18",
"description": "All versions of Jooby are vulnerable to HTTP Response Splitting. if `DefaultHttpHeaders` is set to false.",
"fixed_versions": [
"2.2.1"
],
"identifier": "CVE-2020-7622",
"identifiers": [
"CVE-2020-7622",
"GHSA-gv3v-92v6-m48j"
],
"not_impacted": "All versions starting from 2.2.1",
"package_slug": "maven/io.jooby/jooby",
"pubdate": "2020-04-06",
"solution": "Upgrade to version 2.2.1 or above.",
"title": "Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-7622"
],
"uuid": "27cc1613-3062-4262-acb0-6bcf4cdcca95"
},
{
"affected_range": "(,1.6.9)",
"affected_versions": "All versions before 1.6.9",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-444",
"CWE-937"
],
"date": "2023-07-18",
"description": "Jooby is vulnerable to HTTP Response Splitting if `DefaultHttpHeaders` is set to false.",
"fixed_versions": [
"1.6.9"
],
"identifier": "CVE-2020-7622",
"identifiers": [
"CVE-2020-7622",
"GHSA-gv3v-92v6-m48j"
],
"not_impacted": "All versions starting from 1.6.9",
"package_slug": "maven/org.jooby/jooby",
"pubdate": "2020-04-06",
"solution": "Upgrade to version 1.6.9 or above.",
"title": "Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-7622",
"https://github.com/jooby-project/jooby/commit/654c56ea013b795f60e95036c5e86992373d0ff2"
],
"uuid": "f331c35b-d789-4d4a-a73f-d8edfb3dd572"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:jooby:jooby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.6.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:jooby:jooby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.2.1",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"ID": "CVE-2020-7622"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn\u0027t being abused for HTTP Response Splitting."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249"
},
{
"name": "https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j"
},
{
"name": "https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-08-03T15:24Z",
"publishedDate": "2020-04-06T15:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…