Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-31870

Опубликовано: 11 мар. 2026
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in cpp-httplib. A remote attacker, acting as a malicious server or through a man-in-the-middle position, can send a specially crafted HTTP response with a malformed Content-Length header. This lack of input validation and exception handling causes the client application to crash, resulting in a Denial of Service (DoS).

Отчет

This IMPORTANT vulnerability in cpp-httplib allows a remote attacker, acting as a malicious server or through a man-in-the-middle position, to trigger a denial of service in client applications utilizing the streaming API. The flaw occurs due to insufficient input validation of the Content-Length header, leading to an application crash. No authentication or user interaction is required for successful exploitation. This affects Red Hat Community Projects that incorporate cpp-httplib, such as those in EPEL and Fedora.

Дополнительная информация

Статус:

Important
Дефект:
CWE-1287
https://bugzilla.redhat.com/show_bug.cgi?id=2446713cpp-httplib: cpp-httplib: Denial of Service via malformed Content-Length header

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
16 дней назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on the Content-Length header value received from the server with no input validation and no exception handling. std::stoull throws std::invalid_argument for non-numeric strings and std::out_of_range for values exceeding ULLONG_MAX. Since nothing catches these exceptions, the C++ runtime calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to — including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions can crash the client application with a single HTTP response. No authentication is required. No interaction from the end user is required. The crash is deterministic and immediate. This vulnerability is fixed in 0.37.1.

CVSS3: 7.5
nvd
16 дней назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on the Content-Length header value received from the server with no input validation and no exception handling. std::stoull throws std::invalid_argument for non-numeric strings and std::out_of_range for values exceeding ULLONG_MAX. Since nothing catches these exceptions, the C++ runtime calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to — including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions can crash the client application with a single HTTP response. No authentication is required. No interaction from the end user is required. The crash is deterministic and immediate. This vulnerability is fixed in 0.37.1.

CVSS3: 7.5
debian
16 дней назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTT ...

7.5 High

CVSS3