6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
7.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
38.9%
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-community | noarch | go | <ย 1.20.6-r0 | UNKNOWN |
Alpine | 3.18-community | noarch | go | <ย 1.20.7-r0 | UNKNOWN |
Alpine | 3.19-community | noarch | go | <ย 1.20.6-r0 | UNKNOWN |
Alpine | 3.20-community | noarch | go | <ย 1.20.6-r0 | UNKNOWN |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
7.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
38.9%