{"id":"CVE-2020-5216","details":"In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy header with the remaining value of the original string. It will continue to create new headers for each newline. This has been fixed in 6.3.0, 5.2.0, and 3.9.0.","aliases":["GHSA-w978-rmpf-qmwg"],"modified":"2026-05-16T03:55:09.557558467Z","published":"2020-01-23T03:15:10.683Z","database_specific":{},"references":[{"type":"FIX","url":"https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0"},{"type":"EVIDENCE","url":"https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}]}