CVE-2023-26142

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:crowcpp:crow:1.0\+5:*:*:*:*:*:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 6.5
References () https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c - Exploit, Third Party Advisory () https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c - Exploit, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 - Third Party Advisory () https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 - Third Party Advisory

19 Sep 2023, 20:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (MISC) https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c - (MISC) https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c - Exploit, Third Party Advisory
References (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 - (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 - Third Party Advisory
CPE cpe:2.3:a:crowcpp:crow:1.0\+5:*:*:*:*:*:*:*
First Time Crowcpp
Crowcpp crow
CWE CWE-74

12 Sep 2023, 11:52

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-12 05:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26142

Mitre link : CVE-2023-26142

CVE.ORG link : CVE-2023-26142


JSON object : View

Products Affected

crowcpp

  • crow
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')