ID

VAR-202209-2019


CVE

CVE-2022-3215


TITLE

apple's  SwiftNIO  Injection vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-018518

DESCRIPTION

NIOHTTP1 and projects using it for generating HTTP responses can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines to their input (usually in encoded form) and "inject" those newlines into the returned HTTP response. This capability allows users to work around security headers and HTTP/1.1 framing headers by injecting entirely false responses or other new headers. The injected false responses may also be treated as the response to subsequent requests, which can lead to XSS, cache poisoning, and a number of other flaws. This issue was resolved by adding validation to the HTTPHeaders type, ensuring that there's no whitespace incorrectly present in the HTTP headers provided by users. As the existing API surface is non-failable, all invalid characters are replaced by linear whitespace. apple's SwiftNIO There is an injection vulnerability in.Information may be tampered with. swift-nio-http2 is a SwiftPM project that can be built and tested very simply. There is a security vulnerability in swift-nio-http2 versions before 2.41.2

Trust: 1.71

sources: NVD: CVE-2022-3215 // JVNDB: JVNDB-2022-018518 // VULHUB: VHN-429045

AFFECTED PRODUCTS

vendor:applemodel:swiftnioscope:gteversion:2.40.0

Trust: 1.0

vendor:applemodel:swiftnioscope:ltversion:2.42.0

Trust: 1.0

vendor:applemodel:swiftnioscope:ltversion:2.29.1

Trust: 1.0

vendor:applemodel:swiftnioscope:ltversion:2.39.1

Trust: 1.0

vendor:applemodel:swiftnioscope:gteversion:2.30.0

Trust: 1.0

vendor:アップルmodel:swiftnioscope:eqversion:2.30.0 that's all 2.39.1

Trust: 0.8

vendor:アップルmodel:swiftnioscope:eqversion: -

Trust: 0.8

vendor:アップルmodel:swiftnioscope:eqversion:2.29.1

Trust: 0.8

vendor:アップルmodel:swiftnioscope:eqversion:2.40.0 that's all 2.42.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-018518 // NVD: CVE-2022-3215

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-3215
value: HIGH

Trust: 1.0

NVD: CVE-2022-3215
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202209-2913
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-3215
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-3215
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-018518 // CNNVD: CNNVD-202209-2913 // NVD: CVE-2022-3215

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.1

problemtype:CWE-113

Trust: 1.0

problemtype:injection (CWE-74) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-429045 // JVNDB: JVNDB-2022-018518 // NVD: CVE-2022-3215

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202209-2913

TYPE

injection

Trust: 0.6

sources: CNNVD: CNNVD-202209-2913

PATCH

title:Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in swift-niourl:https://github.com/apple/swift-nio/security/advisories/GHSA-7fj7-39wj-c64f

Trust: 0.8

title:swift-nio-http2 Repair measures for injecting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=209704

Trust: 0.6

sources: JVNDB: JVNDB-2022-018518 // CNNVD: CNNVD-202209-2913

EXTERNAL IDS

db:NVDid:CVE-2022-3215

Trust: 3.3

db:JVNDBid:JVNDB-2022-018518

Trust: 0.8

db:CNNVDid:CNNVD-202209-2913

Trust: 0.7

db:VULHUBid:VHN-429045

Trust: 0.1

sources: VULHUB: VHN-429045 // JVNDB: JVNDB-2022-018518 // CNNVD: CNNVD-202209-2913 // NVD: CVE-2022-3215

REFERENCES

url:https://github.com/apple/swift-nio/security/advisories/ghsa-7fj7-39wj-c64f

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-3215

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-3215/

Trust: 0.6

sources: VULHUB: VHN-429045 // JVNDB: JVNDB-2022-018518 // CNNVD: CNNVD-202209-2913 // NVD: CVE-2022-3215

SOURCES

db:VULHUBid:VHN-429045
db:JVNDBid:JVNDB-2022-018518
db:CNNVDid:CNNVD-202209-2913
db:NVDid:CVE-2022-3215

LAST UPDATE DATE

2024-08-14T15:11:15.298000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-429045date:2022-09-30T00:00:00
db:JVNDBid:JVNDB-2022-018518date:2023-10-20T05:55:00
db:CNNVDid:CNNVD-202209-2913date:2022-10-08T00:00:00
db:NVDid:CVE-2022-3215date:2022-09-30T23:06:38.343

SOURCES RELEASE DATE

db:VULHUBid:VHN-429045date:2022-09-28T00:00:00
db:JVNDBid:JVNDB-2022-018518date:2023-10-20T00:00:00
db:CNNVDid:CNNVD-202209-2913date:2022-09-28T00:00:00
db:NVDid:CVE-2022-3215date:2022-09-28T20:15:17.593