Bug 1306203 (CVE-2016-2216)
Summary: | CVE-2016-2216 nodejs: Response splitting vulnerability using Unicode characters | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abaron, abhgupta, ahardin, apevec, ayoung, bleanhar, cbuissar, ccoleman, chrisw, cvsbot-xmlrpc, dallan, dbaker, dedgar, dmcphers, gkotton, hhorak, jgoulding, jialiu, jjoyce, jkeck, joelsmith, jokerman, jorton, jschluet, kbasil, lhh, lmeyer, lpeer, markmc, mchappel, mmaslano, mmccomas, mrunge, nodejs-sig, rbryant, sclewis, sgallagh, srevivo, tchollingsworth, tdawson, tdecacqu, thrcka, tiwillia, zsvetlik |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nodejs 0.10.42, nodejs 0.12.10, nodejs 4.3.0, nodejs 5.6.0 | Doc Type: | Bug Fix |
Doc Text: |
It was found that nodejs functions manipulating HTTP headers did not properly forbid invalid characters. An attacker with ability to tamper with HTTP headers could use this flaw to inject a new-line allowing a response splitting attack.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-05-20 21:15:44 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1306206, 1306207, 1306208, 1417961, 1417963 | ||
Bug Blocks: | 1306204 |
Description
Adam Mariš
2016-02-10 10:22:14 UTC
Created nodejs tracking bugs for this issue: Affects: fedora-all [bug 1306207] Affects: epel-all [bug 1306208] Root cause analysis: http://blog.safebreach.com/2016/02/09/http-response-splitting-in-node-js-root-cause-analysis/ nodejs-0.10.42-4.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. nodejs-0.10.42-4.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. nodejs-0.10.42-4.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. nodejs-0.10.42-4.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report. Patches : master branch : https://github.com/nodejs/node/commit/7bef1b7907 4.x branch : https://github.com/nodejs/node/commit/cf2b714b02 0.10.x branch : https://github.com/nodejs/node/commit/5c94624 (In reply to Ján Rusnačko from comment #3) > Root cause analysis: > > http://blog.safebreach.com/2016/02/09/http-response-splitting-in-node-js- > root-cause-analysis/ The blog post has moved to: https://safebreach.com/Post/HTTP-Response-Splitting-in-Node-js-Root-Cause-Analysis Openshift Enterprise is pointed to latest RHSCL Node 4 image, which is 4.6.2. Marking as not afffected. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2016-2216 |