Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3r2p-c9r5-pw6w

Опубликовано: 19 сент. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.1

Описание

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

EPSS

Процентиль: 44%
0.00219
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-113
CWE-74

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

EPSS

Процентиль: 44%
0.00219
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-113
CWE-74