vonage-laravel
vonage-laravel copied to clipboard
vonage/client-4.0.0: 2 vulnerabilities (highest severity is: 7.5)
Vulnerable Library - vonage/client-4.0.0
Found in HEAD commit: 16c56b01c3e1dcfc5f55ba5e115f4a4aa8d69678
Vulnerabilities
| CVE | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (vonage/client version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2023-29530 | 7.5 | Not Defined | 0.1% | laminas/laminas-diactoros-2.24.0 | Transitive | N/A* | ❌ | ||
| CVE-2023-29197 | 5.3 | Proof of concept | 0.3% | guzzlehttp/psr7-2.4.3 | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-29530
Vulnerable Library - laminas/laminas-diactoros-2.24.0
PSR HTTP Message implementations
Library home page: https://api.github.com/repos/laminas/laminas-diactoros/zipball/6028af6c3b5ced4d063a680d2483cce67578b902
Dependency Hierarchy:
- vonage/client-4.0.0 (Root Library)
- vonage/client-core-4.0.10
- :x: laminas/laminas-diactoros-2.24.0 (Vulnerable Library)
- vonage/client-core-4.0.10
Found in HEAD commit: 16c56b01c3e1dcfc5f55ba5e115f4a4aa8d69678
Found in base branch: main
Vulnerability Details
Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling withHeader().
Publish Date: 2023-04-24
URL: CVE-2023-29530
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.1%
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-xv3h-4844-9h36
Release Date: 2023-04-24
Fix Resolution: 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.2, 2.25.2
CVE-2023-29197
Vulnerable Library - guzzlehttp/psr7-2.4.3
PSR-7 message implementation that also provides common utility methods
Library home page: https://api.github.com/repos/guzzle/psr7/zipball/67c26b443f348a51926030c83481b85718457d3d
Dependency Hierarchy:
- vonage/client-4.0.0 (Root Library)
- guzzlehttp/guzzle-7.5.0
- :x: guzzlehttp/psr7-2.4.3 (Vulnerable Library)
- guzzlehttp/guzzle-7.5.0
Found in HEAD commit: 16c56b01c3e1dcfc5f55ba5e115f4a4aa8d69678
Found in base branch: main
Vulnerability Details
guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.
Publish Date: 2023-04-17
URL: CVE-2023-29197
Threat Assessment
Exploit Maturity: Proof of concept
EPSS: 0.3%
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
Release Date: 2023-04-17
Fix Resolution: 1.9.1,2.4.5