{"uuid": "f180dfd3-13cd-45e7-9e85-86127eadfc56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5216", "type": "seen", "source": "https://t.me/cveNotify/394", "content": "\ud83d\udea8 CVE-2020-5216\nIn Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2020-01-23T08:37:40.000000Z"}