Description
All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Published: 2023-09-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-29980 All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
History

Thu, 26 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-26T14:23:48.768Z

Reserved: 2023-02-20T10:28:48.928Z

Link: CVE-2023-26142

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.673Z

cve-icon NVD

Status : Modified

Published: 2023-09-12T05:15:41.467

Modified: 2024-11-21T07:50:51.920

Link: CVE-2023-26142

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses