Логотип exploitDog
bind:CVE-2023-26138
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26138

Количество 2

Количество 2

nvd логотип

CVE-2023-26138

больше 2 лет назад

All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-3jvv-m32r-4hpf

больше 2 лет назад

All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26138

All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад
github логотип
GHSA-3jvv-m32r-4hpf

All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу