All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-11-19T18:56:29.683Z
Reserved: 2023-02-20T10:28:48.926Z
Link: CVE-2023-26137

Updated: 2024-08-02T11:39:06.625Z

Status : Modified
Published: 2023-07-06T05:15:09.103
Modified: 2024-11-21T07:50:51.267
Link: CVE-2023-26137

No data.