All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.
References
Link | Resource |
---|---|
https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b | Exploit |
https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2023-07-06T05:00:01.214Z
Updated: 2023-07-06T05:00:01.214Z
Reserved: 2023-02-20T10:28:48.926Z
Link: CVE-2023-26138
JSON object: View
NVD Information
Status : Modified
Published: 2023-07-06T05:15:09.250
Modified: 2023-11-07T04:09:26.763
Link: CVE-2023-26138
JSON object: View
Redhat Information
No data.