Логотип exploitDog
bind:CVE-2023-26142
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26142

Количество 2

Количество 2

nvd логотип

CVE-2023-26142

больше 2 лет назад

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3r2p-c9r5-pw6w

больше 2 лет назад

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26142

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-3r2p-c9r5-pw6w

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу