Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-66570

Опубликовано: 05 дек. 2025
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 10

Описание

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, ng...

РелизСтатусПримечание
devel

needed

esm-apps/jammy

released

0.10.3+ds-1ubuntu0.1~esm1
esm-apps/noble

released

0.14.3+ds-1.1ubuntu0.1~esm1
jammy

needed

noble

needed

plucky

released

0.18.7-1ubuntu0.25.04.1
questing

released

0.18.7-1ubuntu0.25.10.1
upstream

released

0.27.0

Показывать по

EPSS

Процентиль: 16%
0.00052
Низкий

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
nvd
4 месяца назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, nginx

CVSS3: 10
debian
4 месяца назад

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTT ...

suse-cvrf
3 месяца назад

Security update for cpp-httplib

EPSS

Процентиль: 16%
0.00052
Низкий

10 Critical

CVSS3

Уязвимость CVE-2025-66570