发布时间: 2025年2月15日
修改时间: 2025年2月15日
cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters ("") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more.
NVD | openEuler | |
---|---|---|
Confidentiality | None | |
Attack Vector | Network | |
CVSS评分 | N/A | 5.3 |
Attack Complexity | Low | |
Privileges Required | None | |
Scope | Unchanged | |
Integrity | Low | |
User Interaction | None | |
Availability | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-1080 | cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters ("\r") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more. | 2025年2月9日 |
KylinSec-SA-2025-1608 | cpp-httplib security update | 2025年3月18日 |
产品 | 包 | 状态 |
---|---|---|
V6 | cpp-httplib | Fixed |
KY3.5.3 | cpp-httplib | Fixed |