The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 08 Sep 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift Distributed Tracing
|
|
CPEs | cpe:/a:redhat:openshift_distributed_tracing:2.9::el8 | |
Vendors & Products |
Redhat openshift Distributed Tracing
|
Mon, 19 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Redhat openshift Distributed Tracing
|
MITRE
Status: PUBLISHED
Assigner: Go
Published: 2023-07-11T19:23:58.511Z
Updated: 2024-11-07T15:39:53.007Z
Reserved: 2023-04-05T19:36:35.043Z
Link: CVE-2023-29406
Vulnrichment
Updated: 2024-08-02T14:07:45.735Z
NVD
Status : Modified
Published: 2023-07-11T20:15:10.643
Modified: 2024-11-21T07:56:59.913
Link: CVE-2023-29406
Redhat