Lucene search

K
cve[email protected]CVE-2023-29406
HistoryJul 11, 2023 - 8:15 p.m.

CVE-2023-29406

2023-07-1120:15:10
CWE-436
web.nvd.nist.gov
282
http/1
injection
host header
security vulnerability
nvd
cve-2023-29406

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.0%

The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.

Affected configurations

NVD
Node
golanggoRange<1.19.11
OR
golanggoRange1.20.0โ€“1.20.6

CNA Affected

[
  {
    "vendor": "Go standard library",
    "product": "net/http",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "net/http",
    "versions": [
      {
        "version": "0",
        "lessThan": "1.19.11",
        "status": "affected",
        "versionType": "semver"
      },
      {
        "version": "1.20.0-0",
        "lessThan": "1.20.6",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "Request.write"
      },
      {
        "name": "Client.CloseIdleConnections"
      },
      {
        "name": "Client.Do"
      },
      {
        "name": "Client.Get"
      },
      {
        "name": "Client.Head"
      },
      {
        "name": "Client.Post"
      },
      {
        "name": "Client.PostForm"
      },
      {
        "name": "Get"
      },
      {
        "name": "Head"
      },
      {
        "name": "Post"
      },
      {
        "name": "PostForm"
      },
      {
        "name": "Request.Write"
      },
      {
        "name": "Request.WriteProxy"
      },
      {
        "name": "Transport.CancelRequest"
      },
      {
        "name": "Transport.CloseIdleConnections"
      },
      {
        "name": "Transport.RoundTrip"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.0%