SB2018032912 - HTTP response splitting in ruby (Alpine package)
Published: March 29, 2018
Security Bulletin ID
SB2018032912
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) HTTP response splitting (CVE-ID: CVE-2017-17742)
The vulnerability allows a remote attacker to perform HTTP response splitting attack.The weakness exists due to improper handling of HTTP requests. If a script accepts an external input and outputs it without modification as a part of HTTP responses, a remote attacker can use newline characters to trick the victim that the HTTP response header is stopped at there and inject fake HTTP responses after the newline characters to show malicious contents to the victim.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=9f704bf9da4bdb94ea9e7bcee0259b0b5f8f937d
- https://git.alpinelinux.org/aports/commit/?id=0666c3405e078562e5e6cefc77d45e8cc91092bc
- https://git.alpinelinux.org/aports/commit/?id=0bba17025ab6922c000ede63361dd0220e92ed31
- https://git.alpinelinux.org/aports/commit/?id=1779cab830661bf6686eb27c5b5c3117f8b91cee
- https://git.alpinelinux.org/aports/commit/?id=8e71f2e5fdb9d522368ddca664bf4a3f68864028
- https://git.alpinelinux.org/aports/commit/?id=a491b96c266e9165971fad3460ad3c8371fa5f3d