Ruby gem cgi.rb prior to versions 0.3.5, 0.2.2 and 0.1.0.2 allow HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This issue has been patched in versions 0.3.5, 0.2.2 and 0.1.0.2.
{
"github_reviewed_at": "2022-11-24T01:59:37Z",
"github_reviewed": true,
"severity": "HIGH",
"nvd_published_at": "2022-11-18T23:15:00Z",
"cwe_ids": [
"CWE-436",
"CWE-74"
]
}