Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9741

Опубликовано: 13 мар. 2019
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

Отчет

This issue affects the versions of golang as shipped with Red Hat Ceph Storage 2 and 3, and Red Hat Gluster Storage 3 as the vulnerable code is present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2golangAffected
Red Hat Ceph Storage 3golangAffected
Red Hat Enterprise Linux 7golangWill not fix
Red Hat OpenStack Platform 8 (Liberty) Operational ToolsgolangWill not fix
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolsgolangWill not fix
Red Hat Storage 3golangAffected
Red Hat Developer Toolsgo-toolset-1.11FixedRHSA-2019:130030.05.2019
Red Hat Developer Toolsgo-toolset-1.11-golangFixedRHSA-2019:130030.05.2019
Red Hat Enterprise Linux 8go-toolsetFixedRHSA-2019:151918.06.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-113
https://bugzilla.redhat.com/show_bug.cgi?id=1688230golang: CRLF injection in net/http

EPSS

Процентиль: 87%
0.03468
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 6.1
nvd
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

CVSS3: 6.1
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.1
debian
почти 7 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is po ...

CVSS3: 6.1
github
больше 3 лет назад

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

EPSS

Процентиль: 87%
0.03468
Низкий

5.3 Medium

CVSS3