CVE-2023-26137

MEDIUM WAF: High
CVSS 6.1 Published: 2023-07-06
CWE-113

All versions of the package drogonframework/drogon are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values in the addHeader and addCookie functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

WAF Coverage Analysis

HTTP Response Splitting High WAF Coverage

OWASP: A03:2021 Injection

921xxx - Protocol Attack

Affected Software

VendorProductVersion
drogondrogonall versions

References

Back to CVE Database