All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.
References
Link | Resource |
---|---|
https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2023-09-29T05:00:04.105Z
Updated: 2023-09-29T05:00:04.105Z
Reserved: 2023-02-20T10:28:48.929Z
Link: CVE-2023-26147
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-29T05:15:46.630
Modified: 2023-11-07T04:09:28.360
Link: CVE-2023-26147
JSON object: View
Redhat Information
No data.