An issue was discovered in Netdata 1.10.0. HTTP Header Injection exists via the api/v1/data filename parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.
Link | Tags |
---|---|
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | third party advisory patch |
https://github.com/netdata/netdata/blob/798c141c49ee85bddc8f48f25d2cb593ec96da07/web/api/web_api_v1.c#L367-L370 | third party advisory |
https://github.com/netdata/netdata/pull/4521 | third party advisory |
https://www.red4sec.com/cve/netdata_header_injection.txt | third party advisory exploit |