cvelist/2023/26xxx/CVE-2023-26148.json

94 lines
3.1 KiB
JSON
Raw Normal View History

2023-02-20 11:00:48 +00:00
{
2023-09-29 05:00:35 +00:00
"data_version": "4.0",
2023-02-20 11:00:48 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-26148",
2023-09-29 05:00:35 +00:00
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
2023-02-20 11:00:48 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-29 05:00:35 +00:00
"value": "All versions of the package ithewei/libhv are vulnerable to CRLF Injection when untrusted user input is used to set request headers. An attacker can add the \\r\\n (carriage return line feeds) characters and inject additional headers in the request sent."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CRLF Injection",
"cweId": "CWE-93"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "ithewei/libhv",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "*"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769",
"refsource": "MISC",
"name": "https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769"
},
{
"url": "https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e",
"refsource": "MISC",
"name": "https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e"
}
]
},
"credits": [
{
"lang": "en",
"value": "Alessio Della Libera"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P"
2023-02-20 11:00:48 +00:00
}
]
}
}