All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
References
Link | Resource |
---|---|
https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a | Exploit |
https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2023-07-06T05:00:03.695Z
Updated: 2023-07-06T05:00:03.695Z
Reserved: 2023-02-20T10:28:48.926Z
Link: CVE-2023-26137
JSON object: View
NVD Information
Status : Modified
Published: 2023-07-06T05:15:09.103
Modified: 2023-11-07T04:09:26.580
Link: CVE-2023-26137
JSON object: View
Redhat Information
No data.