CVE-2023-26138

All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.
Configurations

Configuration 1 (hide)

cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*

History

13 Jul 2023, 16:34

Type Values Removed Values Added
First Time Drogon
Drogon drogon
CWE CWE-74
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*
References (MISC) https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b - (MISC) https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b - Exploit
References (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555 - (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555 - Third Party Advisory

06 Jul 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-06 05:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-26138

Mitre link : CVE-2023-26138

CVE.ORG link : CVE-2023-26138


JSON object : View

Products Affected

drogon

  • drogon
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')