An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1749-1 | golang security update |
Debian DLA |
DLA-2591-1 | golang-1.7 security update |
Debian DLA |
DLA-2592-1 | golang-1.8 security update |
EUVD |
EUVD-2019-19104 | An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:01:54.025Z
Reserved: 2019-03-13T00:00:00
Link: CVE-2019-9741
No data.
Status : Modified
Published: 2019-03-13T08:29:00.553
Modified: 2024-11-21T04:52:12.840
Link: CVE-2019-9741
OpenCVE Enrichment
No data.
Debian DLA
EUVD