- Description
- All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.
- Source
- report@snyk.io
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drogon:drogon:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A5F68A64-1C41-4AA0-AE90-6B068A88BA90"
}
],
"operator": "OR"
}
]
}
]