Impact
Scripts passing user-controlled values to http.request header values are affected. An attacker could use this to send arbitrary requests, potentially leveraging authentication tokens provided in the same headers table.
Patches
As of 0.9.5, an error is raised when these characters are given in a header value.
Workarounds
Stripping these characters e.g. via :replace("\r", ""):replace("\n", "")
would be a possible workaround.
Impact
Scripts passing user-controlled values to http.request header values are affected. An attacker could use this to send arbitrary requests, potentially leveraging authentication tokens provided in the same headers table.
Patches
As of 0.9.5, an error is raised when these characters are given in a header value.
Workarounds
Stripping these characters e.g. via
:replace("\r", ""):replace("\n", "")
would be a possible workaround.