CVE-2023-26147

All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ithewei:libhv:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
References () https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b - Exploit, Third Party Advisory () https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b - Exploit, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 - Third Party Advisory () https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 - Third Party Advisory
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 5.3

02 Oct 2023, 20:03

Type Values Removed Values Added
References (MISC) https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b - (MISC) https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b - Exploit, Third Party Advisory
References (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 - (MISC) https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 - Third Party Advisory
CPE cpe:2.3:a:ithewei:libhv:*:*:*:*:*:*:*:*
CWE CWE-79
First Time Ithewei
Ithewei libhv
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

29 Sep 2023, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-29 05:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26147

Mitre link : CVE-2023-26147

CVE.ORG link : CVE-2023-26147


JSON object : View

Products Affected

ithewei

  • libhv
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')