5
CVSSv2

CVE-2020-11709

Published: 12/04/2020 Updated: 13/04/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

cpp-httplib up to and including 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cpp-httplib project cpp-httplib

Vendor Advisories

Debian Bug report logs - #1037100 cpp-httplib: CVE-2023-26130 Package: src:cpp-httplib; Maintainer for src:cpp-httplib is Andrea Pappacoda <andrea@pappacodait>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 4 Jun 2023 19:15:01 UTC Severity: important Tags: security, upstream Found in version cpp ...