cve/2023/CVE-2023-26147.md

20 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26147](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26147)
![](https://img.shields.io/static/v1?label=Product&message=ithewei%2Flibhv&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=HTTP%20Response%20Splitting&color=brighgreen)
### Description
All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.
### POC
#### Reference
- https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b
- https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768
#### Github
- https://github.com/dellalibera/dellalibera
- https://github.com/fkie-cad/nvd-json-data-feeds