Total
55 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-11236 | 1 Python | 1 Urllib3 | 2023-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. | |||||
CVE-2018-6148 | 1 Google | 1 Chrome | 2023-11-07 | 4.3 MEDIUM | 6.5 MEDIUM |
Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | |||||
CVE-2018-12477 | 1 Opensuse | 1 Leap | 2023-11-07 | 6.4 MEDIUM | 7.5 HIGH |
A Improper Neutralization of CRLF Sequences vulnerability in Open Build Service allows remote attackers to cause deletion of directories by tricking obs-service-refresh_patches to delete them. Affected releases are openSUSE Open Build Service: versions prior to d6244245dda5367767efc989446fe4b5e4609cce. | |||||
CVE-2017-15400 | 1 Google | 1 Chrome Os | 2023-11-07 | 9.3 HIGH | 7.8 HIGH |
Insufficient restriction of IPP filters in CUPS in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker to execute a command with the same privileges as the cups daemon via a crafted PPD file, aka a printer zeroconfig CRLF issue. | |||||
CVE-2016-4975 | 1 Apache | 1 Http Server | 2023-11-07 | 4.3 MEDIUM | 6.1 MEDIUM |
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31). | |||||
CVE-2022-35948 | 1 Nodejs | 1 Undici | 2023-03-28 | N/A | 5.3 MEDIUM |
undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround. | |||||
CVE-2021-39172 | 1 Catchethq | 1 Catchet | 2022-12-13 | 6.5 MEDIUM | 8.8 HIGH |
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. | |||||
CVE-2022-31150 | 1 Nodejs | 1 Undici | 2022-10-28 | N/A | 6.5 MEDIUM |
undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible to inject CRLF sequences into request headers in undici in versions less than 5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from untrusted sources to eliminate `\r\n` is a workaround for this issue. | |||||
CVE-2022-0666 | 1 Microweber | 1 Microweber | 2022-02-26 | 5.0 MEDIUM | 7.5 HIGH |
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | |||||
CVE-2021-4097 | 1 Phpservermonitor | 1 Php Server Monitor | 2021-12-15 | 5.8 MEDIUM | 5.4 MEDIUM |
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences | |||||
CVE-2014-9563 | 2 Atos, Unify | 8 Openscape Desk Phone Ip 35g, Openscape Desk Phone Ip 35g Eco, Openscape Desk Phone Ip 55g and 5 more | 2021-09-09 | 4.0 MEDIUM | 4.9 MEDIUM |
CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd. | |||||
CVE-2018-19585 | 1 Gitlab | 1 Gitlab | 2020-12-24 | 5.0 MEDIUM | 7.5 HIGH |
GitLab CE/EE versions 8.18 up to 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1 have CRLF Injection in Project Mirroring when using the Git protocol. | |||||
CVE-2017-7528 | 1 Redhat | 2 Ansible Tower, Cloudforms Management Engine | 2019-10-09 | 3.3 LOW | 6.5 MEDIUM |
Ansible Tower as shipped with Red Hat CloudForms Management Engine 5 is vulnerable to CRLF Injection. It was found that X-Forwarded-For header allows internal servers to deploy other systems (using callback). | |||||
CVE-2017-18587 | 1 Hyper | 1 Hyper | 2019-09-03 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in the hyper crate before 0.9.18 for Rust. It mishandles newlines in headers. | |||||
CVE-2016-10803 | 1 Cpanel | 1 Cpanel | 2019-08-12 | 5.0 MEDIUM | 7.5 HIGH |
cPanel before 57.9999.105 allows newline injection via LOC records (CPANEL-6923). | |||||
CVE-2018-1000164 | 2 Debian, Gunicorn | 2 Debian Linux, Gunicorn | 2019-06-19 | 5.0 MEDIUM | 7.5 HIGH |
gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in "process_headers" function in "gunicorn/http/wsgi.py" that can result in an attacker causing the server to return arbitrary HTTP headers. This vulnerability appears to have been fixed in 19.5.0. | |||||
CVE-2019-10678 | 1 Domoticz | 1 Domoticz | 2019-05-03 | 5.0 MEDIUM | 7.5 HIGH |
Domoticz before 4.10579 neglects to categorize \n and \r as insecure argument options. | |||||
CVE-2019-10272 | 1 Weaver | 1 E-cology | 2019-05-03 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in Weaver e-cology 9.0. There is a CRLF Injection vulnerability via the /workflow/request/ViewRequestForwardSPA.jsp isintervenor parameter, as demonstrated by the %0aSet-cookie: substring. | |||||
CVE-2019-7313 | 1 Buildbot | 1 Buildbot | 2019-02-06 | 5.8 MEDIUM | 6.1 MEDIUM |
www/resource.py in Buildbot before 1.8.1 allows CRLF injection in the Location header of /auth/login and /auth/logout via the redirect parameter. This affects other web sites in the same domain. | |||||
CVE-2007-0892 | 1 Matthieu Aubry | 1 Phpmyvisites | 2018-10-16 | 7.5 HIGH | N/A |
CRLF injection vulnerability in phpMyVisites before 2.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the url parameter, when the pagename parameter begins with "FILE:". |