Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-3633

Опубликовано: 06 мар. 2026
Источник: redhat
CVSS3: 3.9
EPSS Низкий

Описание

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the soup_message_new() function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

Отчет

This is a LOW impact flaw in libsoup. An attacker could inject arbitrary HTTP headers and request data if an application using libsoup passes unsanitized, user-controlled input to the soup_message_new() function's method parameter.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsoup3Fix deferred
Red Hat Enterprise Linux 6libsoupOut of support scope
Red Hat Enterprise Linux 7libsoupFix deferred
Red Hat Enterprise Linux 8libsoupFix deferred
Red Hat Enterprise Linux 9libsoupFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-93
https://bugzilla.redhat.com/show_bug.cgi?id=2445128libsoup: libsoup: Header and HTTP request injection via CRLF injection

EPSS

Процентиль: 10%
0.00034
Низкий

3.9 Low

CVSS3

Связанные уязвимости

CVSS3: 3.9
ubuntu
18 дней назад

CRLF injection in soup_message_new() when method is user provided

CVSS3: 3.9
nvd
9 дней назад

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

msrc
6 дней назад

Libsoup: libsoup: header and http request injection via crlf injection

CVSS3: 3.9
debian
9 дней назад

A flaw was found in libsoup. A remote attacker, by controlling the met ...

CVSS3: 3.9
github
9 дней назад

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.

EPSS

Процентиль: 10%
0.00034
Низкий

3.9 Low

CVSS3