CVE-2017-7443

apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apt-cacher-ng_project:apt-cacher-ng:*:*:*:*:*:*:*:*
cpe:2.3:a:apt-cacher_project:apt-cacher:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:31

Type Values Removed Values Added
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858739 - Patch, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858739 - Patch, Third Party Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858833 - Patch, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858833 - Patch, Third Party Advisory

Information

Published : 2017-04-05 20:59

Updated : 2024-11-21 03:31


NVD link : CVE-2017-7443

Mitre link : CVE-2017-7443

CVE.ORG link : CVE-2017-7443


JSON object : View

Products Affected

apt-cacher_project

  • apt-cacher

apt-cacher-ng_project

  • apt-cacher-ng
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')