Vulnerabilities (CVE)

Filtered by CWE-93
Total 55 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-11236 1 Python 1 Urllib3 2023-11-07 4.3 MEDIUM 6.1 MEDIUM
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
CVE-2018-6148 1 Google 1 Chrome 2023-11-07 4.3 MEDIUM 6.5 MEDIUM
Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
CVE-2018-12477 1 Opensuse 1 Leap 2023-11-07 6.4 MEDIUM 7.5 HIGH
A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. Affected releases are openSUSE Open Build Service: versions prior to d6244245dda5367767efc989446fe4b5e4609cce.
CVE-2017-15400 1 Google 1 Chrome Os 2023-11-07 9.3 HIGH 7.8 HIGH
Insufficient restriction of IPP filters in CUPS in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker to execute a command with the same privileges as the cups daemon via a crafted PPD file, aka a printer zeroconfig CRLF issue.
CVE-2016-4975 1 Apache 1 Http Server 2023-11-07 4.3 MEDIUM 6.1 MEDIUM
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
CVE-2022-35948 1 Nodejs 1 Undici 2023-03-28 N/A 5.3 MEDIUM
undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.
CVE-2021-39172 1 Catchethq 1 Catchet 2022-12-13 6.5 MEDIUM 8.8 HIGH
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
CVE-2022-31150 1 Nodejs 1 Undici 2022-10-28 N/A 6.5 MEDIUM
undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue.
CVE-2022-0666 1 Microweber 1 Microweber 2022-02-26 5.0 MEDIUM 7.5 HIGH
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
CVE-2021-4097 1 Phpservermonitor 1 Php Server Monitor 2021-12-15 5.8 MEDIUM 5.4 MEDIUM
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences
CVE-2014-9563 2 Atos, Unify 8 Openscape Desk Phone Ip 35g, Openscape Desk Phone Ip 35g Eco, Openscape Desk Phone Ip 55g and 5 more 2021-09-09 4.0 MEDIUM 4.9 MEDIUM
CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd.
CVE-2018-19585 1 Gitlab 1 Gitlab 2020-12-24 5.0 MEDIUM 7.5 HIGH
GitLab CE/EE versions 8.18 up to 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1 have CRLF Injection in Project Mirroring when using the Git protocol.
CVE-2017-7528 1 Redhat 2 Ansible Tower, Cloudforms Management Engine 2019-10-09 3.3 LOW 6.5 MEDIUM
Ansible Tower as shipped with Red Hat CloudForms Management Engine 5 is vulnerable to CRLF Injection. It was found that X-Forwarded-For header allows internal servers to deploy other systems (using callback).
CVE-2017-18587 1 Hyper 1 Hyper 2019-09-03 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in the hyper crate before 0.9.18 for Rust. It mishandles newlines in headers.
CVE-2016-10803 1 Cpanel 1 Cpanel 2019-08-12 5.0 MEDIUM 7.5 HIGH
cPanel before 57.9999.105 allows newline injection via LOC records (CPANEL-6923).
CVE-2018-1000164 2 Debian, Gunicorn 2 Debian Linux, Gunicorn 2019-06-19 5.0 MEDIUM 7.5 HIGH
gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0.
CVE-2019-10678 1 Domoticz 1 Domoticz 2019-05-03 5.0 MEDIUM 7.5 HIGH
Domoticz before 4.10579 neglects to categorize \n and \r as insecure argument options.
CVE-2019-10272 1 Weaver 1 E-cology 2019-05-03 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Weaver e-cology 9.0. There is a CRLF Injection vulnerability via the /workflow/request/ViewRequestForwardSPA.jsp isintervenor parameter, as demonstrated by the %0aSet-cookie: substring.
CVE-2019-7313 1 Buildbot 1 Buildbot 2019-02-06 5.8 MEDIUM 6.1 MEDIUM
www/resource.py in Buildbot before 1.8.1 allows CRLF injection in the Location header of /auth/login and /auth/logout via the redirect parameter. This affects other web sites in the same domain.
CVE-2007-0892 1 Matthieu Aubry 1 Phpmyvisites 2018-10-16 7.5 HIGH N/A
CRLF injection vulnerability in phpMyVisites before 2.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the url parameter, when the pagename parameter begins with "FILE:".