CVE-2023-26137

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-07-06 05:15

Updated : 2023-11-07 04:09


NVD link : CVE-2023-26137

Mitre link : CVE-2023-26137

CVE.ORG link : CVE-2023-26137


JSON object : View

Products Affected

drogon

  • drogon
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')