Source: cpp-httplib Version: 0.11.4+ds-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for cpp-httplib. CVE-2023-26130[0]: | Versions of the package yhirose/cpp-httplib before 0.12.4 are | vulnerable to CRLF Injection when untrusted user input is used to set | the content-type header in the HTTP .Patch, .Post, .Put and .Delete | requests. This can lead to logical errors and other misbehaviors. | **Note:** This issue is present due to an incomplete fix for | [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED- | YHIROSECPPHTTPLIB-2366507). The related CVE-2020-11709 was fixed before the initial upload to Debian. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-26130 https://www.cve.org/CVERecord?id=CVE-2023-26130 [1] https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194 [2] https://github.com/yhirose/cpp-httplib/commit/5b397d455d25a391ba346863830c1949627b4d08 Please adjust the affected versions in the BTS as needed. Regards, Salvatore