Overview
- Description
- A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 4.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-74
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:proxmox:proxmox_mail_gateway:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9F113EE-EBBD-4045-A484-A140DFF23481" }, { "criteria": "cpe:2.3:a:proxmox:pve_http_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8D79E9B-8BD2-474C-BA09-16CCE2852818", "versionEndExcluding": "4.1-3" }, { "criteria": "cpe:2.3:a:proxmox:virtual_environment:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27813454-BC59-4D19-B608-A95E754F60EA" } ], "operator": "OR" } ] } ]