CVE-2023-29197

guzzlehttp/psr7 < 1.9.1 & 2.4.5 - Interpretation Conflict

mediumInterpretation Conflict
5.3
CVSS Score
5.3
CVSS Score
medium
Severity
3.2.2
Patched in
281d
Time to patch

Description

guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade. While some WordPress plugins and themes may be using this library, it does not make them vulnerable to exploitation.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<3.2.2
PublishedApril 17, 2023
Last updatedJanuary 22, 2024

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.