Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-23644

Опубликовано: 24 янв. 2024
Источник: nvd
CVSS3: 6.8
CVSS3: 8.1
EPSS Низкий

Описание

Trillium is a composable toolkit for building internet applications with async rust. In trillium-http prior to 0.3.12 and trillium-client prior to 0.5.4, insufficient validation of outbound header values may lead to request splitting or response splitting attacks in scenarios where attackers have sufficient control over headers. This only affects use cases where attackers have control of request headers, and can insert "\r\n" sequences. Specifically, if untrusted and unvalidated input is inserted into header names or values.

Outbound trillium_http::HeaderValue and trillium_http::HeaderName can be constructed infallibly and were not checked for illegal bytes when sending requests from the client or responses from the server. Thus, if an attacker has sufficient control over header values (or names) in a request or response that they could inject \r\n sequences, they could get the client and server out of sync, and then pivot to gain control over other parts of requests or resp

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:trillium:trillium:*:*:*:*:*:rust:*:*
Версия до 0.5.4 (исключая)
cpe:2.3:a:trillium:trillium-http:*:*:*:*:*:rust:*:*
Версия до 0.3.12 (исключая)

EPSS

Процентиль: 66%
0.00507
Низкий

6.8 Medium

CVSS3

8.1 High

CVSS3

Дефекты

CWE-113
CWE-436

Связанные уязвимости

CVSS3: 6.8
github
около 2 лет назад

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') in trillium-http and trillium-client

EPSS

Процентиль: 66%
0.00507
Низкий

6.8 Medium

CVSS3

8.1 High

CVSS3

Дефекты

CWE-113
CWE-436