CVE-2023-29197 (High) detected in guzzlehttp/psr7-2.4.3 - autoclosed
mend-bolt-for-github opened this issue · comments
CVE-2023-29197 - High Severity Vulnerability
Vulnerable Library - guzzlehttp/psr7-2.4.3
PSR-7 message implementation that also provides common utility methods
Library home page: https://api.github.com/repos/guzzle/psr7/zipball/67c26b443f348a51926030c83481b85718457d3d
Dependency Hierarchy:
- google/gax-v1.18.1 (Root Library)
- ❌ guzzlehttp/psr7-2.4.3 (Vulnerable Library)
Found in base branch: master
Vulnerability Details
guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.
Publish Date: 2023-04-17
URL: CVE-2023-29197
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-wxmh-65f7-jcvw
Release Date: 2023-04-17
Fix Resolution: 1.9.1,2.4.5
Step up your Open Source Security Game with Mend here
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.