CVE-2020-11709

cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cpp-httplib_project:cpp-httplib:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495 - Exploit, Third Party Advisory () https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495 - Exploit, Third Party Advisory
References () https://github.com/yhirose/cpp-httplib/issues/425 - Exploit, Third Party Advisory () https://github.com/yhirose/cpp-httplib/issues/425 - Exploit, Third Party Advisory

Information

Published : 2020-04-12 14:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11709

Mitre link : CVE-2020-11709

CVE.ORG link : CVE-2020-11709


JSON object : View

Products Affected

cpp-httplib_project

  • cpp-httplib
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')