Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-46v6-2c7g-7hfg

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.1

Описание

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

EPSS

Процентиль: 87%
0.03468
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-93

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 5.3
redhat
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 6.1
nvd
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 6.1
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.1
debian
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is po ...

EPSS

Процентиль: 87%
0.03468
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-93