Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1536

Опубликовано: 28 янв. 2026
Источник: redhat
CVSS3: 5.8
EPSS Низкий

Описание

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.

Отчет

This is a MODERATE impact flaw in the libsoup HTTP library, allowing CRLF injection via the soup_message_headers_set_content_disposition() function. An attacker controlling input to the Content-Disposition header can inject arbitrary HTTP headers. Red Hat products are affected if they use libsoup in a configuration that passes unsanitized, untrusted input to this function.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsoup3Fix deferred
Red Hat Enterprise Linux 6libsoupFix deferred
Red Hat Enterprise Linux 7libsoupFix deferred
Red Hat Enterprise Linux 8libsoupFix deferred
Red Hat Enterprise Linux 9libsoupFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-93
https://bugzilla.redhat.com/show_bug.cgi?id=2433834libsoup: libsoup: HTTP header injection or response splitting via CRLF injection in Content-Disposition header

EPSS

Процентиль: 29%
0.00108
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
ubuntu
2 месяца назад

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.

CVSS3: 5.8
nvd
2 месяца назад

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.

CVSS3: 5.8
debian
2 месяца назад

A flaw was found in libsoup. An attacker who can control the input for ...

CVSS3: 5.8
github
2 месяца назад

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.

suse-cvrf
около 2 месяцев назад

Security update for libsoup

EPSS

Процентиль: 29%
0.00108
Низкий

5.8 Medium

CVSS3