Headline
GHSA-x5mq-jjr3-vmx6: Missing validation of header name and value in codeigniter4/framework
Impact
Lack of proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header
class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service’s web application firewall interprets them as malicious and blocks further communication with the application.
Patches
Upgrade to v4.5.8 or later.
Workarounds
Validate HTTP header keys and/or values if using user-supplied values before passing them to Header
class.
Differences from CVE-2023-29197
Affected Software:
- CVE-2023-29197 specifically addresses a vulnerability in the
guzzlehttp/psr7
library. - The reported issue in this Security Advisory is within the CodeIgniter4 framework and does not depend on or use the
guzzlehttp/psr7
library.
- CVE-2023-29197 specifically addresses a vulnerability in the
Root Cause and Implementation:
- The vulnerability reported arises from an issue in the Header class of CodeIgniter4, which is unrelated to the functionality or implementation of
guzzlehttp/psr7
.
- The vulnerability reported arises from an issue in the Header class of CodeIgniter4, which is unrelated to the functionality or implementation of
Scope of Impact:
- The vulnerability described in this Security Advisory affects applications built with the CodeIgniter4 framework, which does not use or rely on the
guzzlehttp/psr7
library.
- The vulnerability described in this Security Advisory affects applications built with the CodeIgniter4 framework, which does not use or rely on the
References
- https://datatracker.ietf.org/doc/html/rfc7230#section-3.2
- https://github.com/advisories/GHSA-wxmh-65f7-jcvw
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-24013
Missing validation of header name and value in codeigniter4/framework
Moderate severity GitHub Reviewed Published Jan 18, 2025 in codeigniter4/CodeIgniter4 • Updated Jan 21, 2025
Package
composer codeigniter4/framework (Composer)
Affected versions
< 4.5.8
Impact
Lack of proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service’s web application firewall interprets them as malicious and blocks further communication with the application.
Patches
Upgrade to v4.5.8 or later.
Workarounds
Validate HTTP header keys and/or values if using user-supplied values before passing them to Header class.
Differences from CVE-2023-29197
Affected Software:
- CVE-2023-29197 specifically addresses a vulnerability in the guzzlehttp/psr7 library.
- The reported issue in this Security Advisory is within the CodeIgniter4 framework and does not depend on or use the guzzlehttp/psr7 library.
Root Cause and Implementation:
- The vulnerability reported arises from an issue in the Header class of CodeIgniter4, which is unrelated to the functionality or implementation of guzzlehttp/psr7.
Scope of Impact:
- The vulnerability described in this Security Advisory affects applications built with the CodeIgniter4 framework, which does not use or rely on the guzzlehttp/psr7 library.
References
- https://datatracker.ietf.org/doc/html/rfc7230#section-3.2
- GHSA-wxmh-65f7-jcvw
References
- GHSA-x5mq-jjr3-vmx6
- https://nvd.nist.gov/vuln/detail/CVE-2025-24013
- codeigniter4/CodeIgniter4@5f8aa24
- https://datatracker.ietf.org/doc/html/rfc7230#section-3.2
- GHSA-wxmh-65f7-jcvw
Published to the GitHub Advisory Database
Jan 21, 2025
Last updated
Jan 21, 2025