Description
All versions of the package ithewei/libhv are vulnerable to CRLF Injection when untrusted user input is used to set request headers. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.
Published: 2023-09-29
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-29983 All versions of the package ithewei/libhv are vulnerable to CRLF Injection when untrusted user input is used to set request headers. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.
History

Mon, 23 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-23T18:39:31.832Z

Reserved: 2023-02-20T10:28:48.929Z

Link: CVE-2023-26148

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.603Z

cve-icon NVD

Status : Modified

Published: 2023-09-29T05:15:46.693

Modified: 2024-11-21T07:50:52.700

Link: CVE-2023-26148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses