CVE-2023-26142

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:crowcpp:crow:1.0\+5:*:*:*:*:*:*:*

History

19 Sep 2023, 20:36

Type Values Removed Values Added
References (MISC) https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c - (MISC) https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c - Exploit, Third Party Advisory
References (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 - (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556 - Third Party Advisory
CWE CWE-74
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Crowcpp
Crowcpp crow
CPE cpe:2.3:a:crowcpp:crow:1.0\+5:*:*:*:*:*:*:*

12 Sep 2023, 11:52

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-12 05:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-26142

Mitre link : CVE-2023-26142

CVE.ORG link : CVE-2023-26142


JSON object : View

Products Affected

crowcpp

  • crow
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')