Описание
In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.104 (включая)
cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.01312
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 9.8
debian
больше 5 лет назад
In Cherokee through 1.2.104, remote attackers can trigger an out-of-bo ...
CVSS3: 9.8
github
больше 3 лет назад
In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers.
EPSS
Процентиль: 79%
0.01312
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-787