Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11709

Опубликовано: 12 апр. 2020
Источник: ubuntu
Приоритет: low
CVSS2: 5
CVSS3: 7.5

Описание

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

РелизСтатусПримечание
bionic

not-affected

code not built
devel

not-affected

code not present
eoan

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal was not-affected [code not present]
focal

not-affected

code not present
groovy

not-affected

code not present
hirsute

not-affected

code not present
impish

not-affected

code not present

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

ignored

end of life

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

CVSS3: 7.5
debian
почти 6 лет назад

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed in ...

CVSS3: 7.5
github
больше 3 лет назад

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

5 Medium

CVSS2

7.5 High

CVSS3