CVE-2023-26147

All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ithewei:libhv:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-09-29 05:15

Updated : 2023-11-07 04:09


NVD link : CVE-2023-26147

Mitre link : CVE-2023-26147

CVE.ORG link : CVE-2023-26147


JSON object : View

Products Affected

ithewei

  • libhv
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')