Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11709

Опубликовано: 12 апр. 2020
Источник: debian
EPSS Низкий

Описание

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cpp-httplibnot-affectedpackage

Примечания

  • https://github.com/yhirose/cpp-httplib/issues/425

  • https://github.com/yhirose/cpp-httplib/commit/85327e19ae7e72028c30917247238d638ce56d0b (v0.5.9)

EPSS

Процентиль: 37%
0.00163
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

CVSS3: 7.5
nvd
почти 6 лет назад

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

CVSS3: 7.5
github
больше 3 лет назад

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

EPSS

Процентиль: 37%
0.00163
Низкий