Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xfj2-w4fv-cg6j

Опубликовано: 20 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 5.3

Описание

A weakness has been identified in jameschz Hush Framework 2.0. The impacted element is an unknown function of the file Hush\hush-lib\hush\Util.php of the component HTTP Host Header Handler. This manipulation of the argument $_SERVER['HOST'] causes improper neutralization of http headers for scripting syntax. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

A weakness has been identified in jameschz Hush Framework 2.0. The impacted element is an unknown function of the file Hush\hush-lib\hush\Util.php of the component HTTP Host Header Handler. This manipulation of the argument $_SERVER['HOST'] causes improper neutralization of http headers for scripting syntax. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 37%
0.00159
Низкий

5.5 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-644

Связанные уязвимости

CVSS3: 5.3
nvd
3 месяца назад

A weakness has been identified in jameschz Hush Framework 2.0. The impacted element is an unknown function of the file Hush\hush-lib\hush\Util.php of the component HTTP Host Header Handler. This manipulation of the argument $_SERVER['HOST'] causes improper neutralization of http headers for scripting syntax. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 37%
0.00159
Низкий

5.5 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-644