Ruby gem cgi.rb prior to versions 0.3.5, 0.2.2 and 0.1.0.2 allow HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This issue has been patched in versions 0.3.5, 0.2.2 and 0.1.0.2.
{ "nvd_published_at": "2022-11-18T23:15:00Z", "cwe_ids": [ "CWE-436", "CWE-74" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-11-24T01:59:37Z" }