Psr 7 Guzzlephp Psr 7

Do you want an email whenever new security vulnerabilities are reported in Guzzlephp Psr 7?

By the Year

In 2024 there have been 0 vulnerabilities in Guzzlephp Psr 7 . Last year Psr 7 had 2 security vulnerabilities published. Right now, Psr 7 is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 7.00
2022 1 7.50
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Psr 7 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Guzzlephp Psr 7 Security Vulnerabilities

Laminas Diactoros provides PSR HTTP Message implementations

CVE-2023-29530 6.5 - Medium - April 24, 2023

Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`.

Improper Input Validation

guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP

CVE-2023-29197 7.5 - High - April 17, 2023

guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.

Interpretation Conflict

guzzlehttp/psr7 is a PSR-7 HTTP message library

CVE-2022-24775 7.5 - High - March 21, 2022

guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.

Improper Input Validation

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Guzzlephp Psr 7 or by Guzzlephp? Click the Watch button to subscribe.

Guzzlephp
Vendor

subscribe