Hotels Styx through 1.0.0.beta8 allows HTTP response splitting owed to CRLF Injection. This is exploitable if untrusted user input can appear in a response header. (CVSS:4.3) (Closing Update:2020-03-17)

2020-03-11T20:00:00-04:00March 11th, 2020|HTTP Response Splitting|


In Puma (RubyGem) before 4.3.3 and 3.12.4, if an application using Puma allows untrusted input in an early-hints header, an attacker can use a stroller return character to end the header and inject malicious content, such as additional headers or an entirely unused or little used response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2020-5247, which fixed this vulnerability but only for regular responses. This has been fixed in 4.3.3 and 3.12.4. (CVSS:4.0) (Final Update:2020-04-09)

2020-03-01T20:00:00-05:00March 1st, 2020|HTTP Response Splitting|
Go to Top