Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-3633

Опубликовано: 17 мар. 2026
Источник: debian
EPSS Низкий

Описание

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libsoup3unfixedpackage
libsoup3no-dsatrixiepackage
libsoup3no-dsabookwormpackage
libsoup2.4removedpackage
libsoup2.4no-dsatrixiepackage
libsoup2.4no-dsabookwormpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2445128

  • https://gitlab.gnome.org/GNOME/libsoup/-/issues/484

EPSS

Процентиль: 10%
0.00034
Низкий

Связанные уязвимости

CVSS3: 3.9
ubuntu
18 дней назад

CRLF injection in soup_message_new() when method is user provided

CVSS3: 3.9
redhat
20 дней назад

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

CVSS3: 3.9
nvd
9 дней назад

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

msrc
6 дней назад

Libsoup: libsoup: header and http request injection via crlf injection

CVSS3: 3.9
github
9 дней назад

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

EPSS

Процентиль: 10%
0.00034
Низкий