The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.safebreach.com/2016/02/09/http-response-splitting-in-node-js-root-cause-analysis/ - | |
References | () http://info.safebreach.com/hubfs/Node-js-Response-Splitting.pdf - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177184.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177673.html - | |
References | () http://packetstormsecurity.com/files/135711/Node.js-HTTP-Response-Splitting.html - | |
References | () http://www.securityfocus.com/bid/83141 - | |
References | () https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/ - Patch, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201612-43 - |
Information
Published : 2016-04-07 21:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2216
Mitre link : CVE-2016-2216
CVE.ORG link : CVE-2016-2216
JSON object : View
Products Affected
fedoraproject
- fedora
nodejs
- node.js
CWE
CWE-20
Improper Input Validation