7.5

CVE-2023-29197

guzzlehttp/psr7 < 1.9.1 & 2.4.5 - Interpretation Conflict

guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.
Mögliche Gegenmaßnahme
WP Offload Media Lite for Amazon S3, DigitalOcean Spaces, and Google Cloud Storage: Update to version 3.2.2, or a newer patched version
WP Offload SES Lite: Update to version 1.6.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WP Offload Media Lite for Amazon S3, DigitalOcean Spaces, and Google Cloud Storage
Version [*, 3.2.2)
SystemWordPress Plugin
Produkt WP Offload SES Lite
Version [*, 1.6.4)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GuzzlephpPsr-7 Version < 1.9.1
GuzzlephpPsr-7 Version >= 2.0.0 < 2.4.5
FedoraprojectFedora Version37
FedoraprojectFedora Version38
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.29% 0.842
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
security-advisories@github.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-436 Interpretation Conflict

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.