CVE-2023-26137

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
References () https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a - Exploit () https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a - Exploit
References () https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 - Third Party Advisory () https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 - Third Party Advisory
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 7.2

13 Jul 2023, 16:28

Type Values Removed Values Added
References (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 - (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 - Third Party Advisory
References (MISC) https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a - (MISC) https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a - Exploit
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*
CWE CWE-444
First Time Drogon
Drogon drogon

06 Jul 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-06 05:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26137

Mitre link : CVE-2023-26137

CVE.ORG link : CVE-2023-26137


JSON object : View

Products Affected

drogon

  • drogon
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')