icon

We found results for “

CVE-2023-26147

Good to know:

icon

Date: September 29, 2023

All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.

Language: C

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-113

Top Fix

icon

Upgrade Version

Upgrade to version libhv-x86-static - no_fix;libhv-x86 - no_fix;hxd.libhv - no_fix;CoApp.libhv-static-MD - no_fix;libhv-ssl-static - no_fix;native.libhv-static-MD - no_fix;native.libhv-ssl-static-MD - no_fix;libhv-ssl - no_fix;CoApp.libhv.static-MD - no_fix

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us