Vulnerability Details CVE-2023-26138
All versions of the package drogonframework/drogon are vulnerable to CRLF Injection when untrusted user input is used to set request headers in the addHeader function. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 42.9%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2023-26138
-
cpe:2.3:a:drogon:drogon:1.0.0
-
cpe:2.3:a:drogon:drogon:1.1.0
-
cpe:2.3:a:drogon:drogon:1.2.0
-
cpe:2.3:a:drogon:drogon:1.3.0
-
cpe:2.3:a:drogon:drogon:1.4.0
-
cpe:2.3:a:drogon:drogon:1.4.1
-
cpe:2.3:a:drogon:drogon:1.5.0
-
cpe:2.3:a:drogon:drogon:1.5.1
-
cpe:2.3:a:drogon:drogon:1.6.0
-
cpe:2.3:a:drogon:drogon:1.7.0
-
cpe:2.3:a:drogon:drogon:1.7.1
-
cpe:2.3:a:drogon:drogon:1.7.2
-
cpe:2.3:a:drogon:drogon:1.7.3
-
cpe:2.3:a:drogon:drogon:1.7.4
-
cpe:2.3:a:drogon:drogon:1.7.5
-
cpe:2.3:a:drogon:drogon:1.8.0
-
cpe:2.3:a:drogon:drogon:1.8.1
-
cpe:2.3:a:drogon:drogon:1.8.2