dmartinez777 / color-picker-test

Assessment
0 stars 0 forks source link

CVE-2022-24775 (High) detected in guzzlehttp/psr7-1.8.1 #66

Open mend-bolt-for-github[bot] opened 10 months ago

mend-bolt-for-github[bot] commented 10 months ago

CVE-2022-24775 - High Severity Vulnerability

Vulnerable Library - guzzlehttp/psr7-1.8.1

PSR-7 message implementation that also provides common utility methods

Library home page: https://api.github.com/repos/guzzle/psr7/zipball/35ea11d335fd638b5882ff1725228b3d35496ab1

Dependency Hierarchy: - guzzlehttp/guzzle-6.5.5 (Root Library) - :x: **guzzlehttp/psr7-1.8.1** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.

Publish Date: 2022-03-21

URL: CVE-2022-24775

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96

Release Date: 2022-03-21

Fix Resolution: 1.8.4,2.1.1


Step up your Open Source Security Game with Mend here