CVE-2023-26130

Improper Neutralization of CRLF Sequences ('CRLF Injection') (CWE-93)

Published: May 30, 2023 / Updated: 18mo ago

010
CVSS 8.8EPSS 0.06%High
CVE info copied to clipboard

Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors. **Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507).

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2023-26130. See article

May 30, 2023 at 5:14 AM / cve.report
EPSS

EPSS Score was set to: 0.06% (Percentile: 22.7%)

Sep 16, 2023 at 4:42 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (194897)

May 2, 2024 at 5:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (285523)

May 2, 2024 at 7:53 AM
Static CVE Timeline Graph

Affected Systems

Cpp-httplib_project/cpp-httplib
+null more

Patches

bugzilla.redhat.com
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-15: Command Delimiters
+null more

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI