Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-21428

Опубликовано: 01 янв. 2026
Источник: redhat
CVSS3: 8.7

Описание

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the write_headers function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines. This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.

A flaw was found in cpp-httplib, a C++ HTTP/HTTPS library. A remote attacker can exploit this vulnerability by injecting carriage return and line feed characters into user-supplied headers. This allows the attacker to add extra headers, modify the request body, and potentially trigger a Server-Side Request Forgery attack, which can be used to make a server send requests to an unintended location.

Отчет

This vulnerability is rated IMPORTANT as it allows remote attackers to perform Server-Side Request Forgery attacks to locations outside the scope of cpp-httplib by injecting carriage return and line feed characters into user-supplied headers. This affects applications utilizing the cpp-httplib library in Red Hat Community Projects such as Fedora and EPEL, where the library is used to process untrusted HTTP headers.

Дополнительная информация

Статус:

Important
Дефект:
CWE-93
https://bugzilla.redhat.com/show_bug.cgi?id=2426666cpp-httplib: cpp-httplib: Server-Side Request Forgery via header injection

8.7 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 месяца назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines. This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.

CVSS3: 7.5
nvd
3 месяца назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines. This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.

CVSS3: 7.5
debian
3 месяца назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTT ...

CVSS3: 7.5
fstec
3 месяца назад

Уязвимость функции write_headers() библиотеки cpp-httplib, позволяющая нарушителю модифицировать защищаемую информацию

8.7 High

CVSS3