All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2023-07-06T05:00:03.695Z
Updated: 2024-11-19T18:56:29.683Z
Reserved: 2023-02-20T10:28:48.926Z
Link: CVE-2023-26137
Vulnrichment
Updated: 2024-08-02T11:39:06.625Z
NVD
Status : Modified
Published: 2023-07-06T05:15:09.103
Modified: 2024-11-21T07:50:51.267
Link: CVE-2023-26137
Redhat
No data.