Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-9jxr-mwpp-w643: Improper header validation in httpsoft/http-message

Impact

Improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n.

Patches

The issue is patched in 1.0.12.

Workarounds

There are no known workarounds.

References

  • https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
ghsa
#git

Improper header validation in httpsoft/http-message

Moderate severity GitHub Reviewed Published Apr 17, 2023 in httpsoft/http-message • Updated Apr 21, 2023

ghsa: Latest News

GHSA-x7m9-mv49-fv73: Vaultwarden vulnerable to user impersonation