### [CVE-2019-20800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20800) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers. ### POC #### Reference - https://github.com/cherokee/webserver/issues/1224 - https://logicaltrust.net/blog/2019/11/cherokee.html #### Github No PoCs found on GitHub currently.