CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.
Link | Tags |
---|---|
https://github.com/nodejs/node/commit/c0f13e56a20f9bde5a67d873a7f9564487160762 | issue tracking patch |
https://access.redhat.com/errata/RHSA-2016:2101 | vendor advisory |
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ | patch vendor advisory |
http://www.securityfocus.com/bid/93483 | vdb entry |
https://security.gentoo.org/glsa/201612-43 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2017-0002.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html | third party advisory vendor advisory |