Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-9741

Опубликовано: 13 мар. 2019
Источник: debian

Описание

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.12fixed1.12-1package
golang-1.11fixed1.11.6-1package
golang-1.8removedpackage
golang-1.7removedpackage
golangremovedpackage

Примечания

  • https://github.com/golang/go/issues/30794

  • https://github.com/golang/go/commit/829c5df58694b3345cb5ea41206783c8ccf5c3ca#diff-b97af51863ce82bf2a13003b52034aa9

  • https://github.com/golang/go/commit/f1d662f34788f4a5f087581d0951cdf4e0f6e708#diff-b97af51863ce82bf2a13003b52034aa9

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 5.3
redhat
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 6.1
nvd
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 6.1
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.1
github
больше 3 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.