Vulnerability Name: | CVE-2019-9741 (CCN-158137) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2019-03-12 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2019-03-12 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-03-22 | ||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C)
4.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-93 CWE-113 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-9741 Source: BID Type: Third Party Advisory, VDB Entry 107432 Source: REDHAT Type: Third Party Advisory RHSA-2019:1300 Source: REDHAT Type: Third Party Advisory RHSA-2019:1519 Source: XF Type: UNKNOWN golang-cve20199741-header-injection(158137) Source: CCN Type: go GIT Repository net/http: CRLF injection vulnerability #30794 Source: MISC Type: Exploit, Patch, Third Party Advisory https://github.com/golang/go/issues/30794 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190403 [SECURITY] [DLA 1749-1] golang security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update Source: FEDORA Type: Third Party Advisory FEDORA-2019-d05bc7e3df Source: CCN Type: IBM Security Bulletin 882596 (API Connect) API Connect V2018 is impacted by a vulnerability in Golang (CVE-2019-9741) Source: CCN Type: IBM Security Bulletin 884414 (Event Streams) IBM Event Streams is affected by Go vulnerabilities Source: CCN Type: IBM Security Bulletin 1143484 (Watson Studio Local) Multiple Vulnerabilities in Go affects IBM Watson Studio Local Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-9741 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |