Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-21428

Опубликовано: 01 янв. 2026
Источник: debian
EPSS Низкий

Описание

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines. This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cpp-httplibunfixedpackage

Примечания

  • https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-wpc6-j37r-jcx7

  • Fixed by: https://github.com/yhirose/cpp-httplib/commit/98048a033a532ff22320ce1d11789f8d5710dfcd (v0.30.0)

EPSS

Процентиль: 10%
0.00036
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
14 дней назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines. This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.

CVSS3: 7.5
nvd
14 дней назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines. This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.

CVSS3: 7.5
fstec
14 дней назад

Уязвимость функции write_headers() библиотеки cpp-httplib, позволяющая нарушителю модифицировать защищаемую информацию

EPSS

Процентиль: 10%
0.00036
Низкий