Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug: HTTP splitting vulnerability #4171

Open
K-Pomian opened this issue Nov 26, 2024 · 0 comments
Open

Bug: HTTP splitting vulnerability #4171

K-Pomian opened this issue Nov 26, 2024 · 0 comments
Assignees
Labels

Comments

@K-Pomian
Copy link
Contributor

Describe the bug.

Static scan showed that in agreementbot/api.go and api/api.go there's a possibility of HTTP splitting.
In both files, within the listen function, a header with the key Access-Control-Allow-Origin is added. However, its value is not validated for potential CRLF injection, which could lead to HTTP request splitting.

Describe the steps to reproduce the behavior.

No response

Expected behavior.

No response

Screenshots.

No response

Operating Environment

Linux

Additional Information

No response

@K-Pomian K-Pomian added the bug label Nov 26, 2024
@K-Pomian K-Pomian self-assigned this Nov 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant