CVE-2021-41084
CVSS V2 Medium 4.3
CVSS V3 Medium 4.7
Description
http4s is an open source scala interface for HTTP. In affected versions http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: Header names (`Header.name`å), Header values (`Header.value`), Status reason phrases (`Status.reason`), URI paths (`Uri.Path`), URI authority registered names (`URI.RegName`) (through 0.21). This issue has been resolved in versions 0.21.30, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following. As a matter of practice http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening.
Overview
- CVE ID
- CVE-2021-41084
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-09-21T18:15:07
- Last Modified Date
- 2022-10-25T14:56:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:* | 1 | OR | 0.21.29 | |
cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:* | 1 | OR | 0.22.0 | 0.22.5 |
cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:* | 1 | OR | 0.23.0 | 0.23.4 |
cpe:2.3:a:typelevel:http4s:1.0.0:milestone1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone10:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone11:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone12:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone13:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone14:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone15:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone16:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone17:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone18:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone19:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone20:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone21:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone22:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone23:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone24:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone25:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone26:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone6:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone7:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone8:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:typelevel:http4s:1.0.0:milestone9:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- CHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 4.7
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 1.4
References
Reference URL | Reference Tags |
---|---|
https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values | Vendor Advisory |
https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8 | Patch Third Party Advisory |
https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3 | Exploit Third Party Advisory |
https://owasp.org/www-community/attacks/HTTP_Response_Splitting | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-41084 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41084 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:52:20 | Added to TrackCVE | |||
2022-12-05 11:04:38 | 2021-09-21T18:15Z | 2021-09-21T18:15:07 | CVE Published Date | updated |
2022-12-05 11:04:38 | 2022-10-25T14:56:00 | CVE Modified Date | updated | |
2022-12-05 11:04:38 | Analyzed | Vulnerability Status | updated |