8.7

CVE-2021-41084

Exploit
http4s is an open source scala interface for HTTP. In affected versions http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: Header names (`Header.name`å), Header values (`Header.value`), Status reason phrases (`Status.reason`), URI paths (`Uri.Path`), URI authority registered names (`URI.RegName`) (through 0.21). This issue has been resolved in versions 0.21.30, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following. As a matter of practice http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TypelevelHttp4s Version < 0.21.29
TypelevelHttp4s Version >= 0.22.0 < 0.22.5
TypelevelHttp4s Version >= 0.23.0 < 0.23.4
TypelevelHttp4s Version1.0.0 Updatemilestone1
TypelevelHttp4s Version1.0.0 Updatemilestone10
TypelevelHttp4s Version1.0.0 Updatemilestone11
TypelevelHttp4s Version1.0.0 Updatemilestone12
TypelevelHttp4s Version1.0.0 Updatemilestone13
TypelevelHttp4s Version1.0.0 Updatemilestone14
TypelevelHttp4s Version1.0.0 Updatemilestone15
TypelevelHttp4s Version1.0.0 Updatemilestone16
TypelevelHttp4s Version1.0.0 Updatemilestone17
TypelevelHttp4s Version1.0.0 Updatemilestone18
TypelevelHttp4s Version1.0.0 Updatemilestone19
TypelevelHttp4s Version1.0.0 Updatemilestone2
TypelevelHttp4s Version1.0.0 Updatemilestone20
TypelevelHttp4s Version1.0.0 Updatemilestone21
TypelevelHttp4s Version1.0.0 Updatemilestone22
TypelevelHttp4s Version1.0.0 Updatemilestone23
TypelevelHttp4s Version1.0.0 Updatemilestone24
TypelevelHttp4s Version1.0.0 Updatemilestone25
TypelevelHttp4s Version1.0.0 Updatemilestone26
TypelevelHttp4s Version1.0.0 Updatemilestone3
TypelevelHttp4s Version1.0.0 Updatemilestone4
TypelevelHttp4s Version1.0.0 Updatemilestone5
TypelevelHttp4s Version1.0.0 Updatemilestone6
TypelevelHttp4s Version1.0.0 Updatemilestone7
TypelevelHttp4s Version1.0.0 Updatemilestone8
TypelevelHttp4s Version1.0.0 Updatemilestone9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.45% 0.629
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.7 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
security-advisories@github.com 8.7 2.2 5.8
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

CWE-918 Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.