Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-60876

Опубликовано: 10 нояб. 2025
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

A flaw was found in BusyBox wget. This vulnerability allows header injection via raw CR/LF and other C0 control bytes in the HTTP request-target. An attacker can exploit this by crafting a URL containing these control characters to inject arbitrary HTTP headers into the outgoing request, potentially leading to HTTP response splitting, cache poisoning, or security policy bypass.

Отчет

This issue arises because BusyBox wget fails to sanitize control characters in the request-target before constructing the HTTP/1.1 request line. When wget processes a URL containing raw CR (0x0D), LF (0x0A), or other C0 control bytes, these characters are passed directly into the HTTP request without percent-encoding. This breaks the expected request-line format (METHOD SP request-target SP HTTP/1.1) and allows an attacker to terminate the request line prematurely and inject arbitrary headers on subsequent lines.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6busyboxFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-93
https://bugzilla.redhat.com/show_bug.cgi?id=2413825busybox: BusyBox wget: HTTP request-target allows header injection

EPSS

Процентиль: 20%
0.00064
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
5 месяцев назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
nvd
5 месяцев назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

msrc
4 месяца назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVSS3: 6.5
debian
5 месяцев назад

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 ...

CVSS3: 6.5
redos
9 дней назад

Уязвимость busybox

EPSS

Процентиль: 20%
0.00064
Низкий

5.4 Medium

CVSS3