Sept. 12, 2023, 5:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content.

attacker build characters crlf injection cve end functions header headers http inject injection input malicious package response return untrusted vulnerable

Security Analysis Senior Analyst

@ NTT DATA | Bengaluru, KA, IN

SAP NS2 SIEM Engineering Manager - Herndon (Hybrid)

@ SAP | Herndon, VA, US, 20171

Security Architect - Infrastructure

@ Yorkshire Water | Bradford, GB

Information System Security Officer, Journeyman (Secret)

@ Resource Management Concepts, Inc. | Patuxent River, Maryland, United States

Technology Information Security GRC Senior

@ KPMG India | Gurgaon, Haryana, India

Principal CyberSecurity Engineer

@ DTCC | Dallas, TX, United States