We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2020-24275 references github.com/swoole/swoole-src, which may be a Go module.
Description: A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers to execute arbitrary code via supplying a crafted URL.
References:
Cross references: No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
modules: - module: github.com/swoole/swoole-src vulnerable_at: 5.0.3+incompatible packages: - package: n/a description: |- A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers to execute arbitrary code via supplying a crafted URL. cves: - CVE-2020-24275 references: - fix: https://github.com/swoole/swoole-src/pull/3539 - fix: https://github.com/swoole/swoole-src/pull/3545 - web: https://blog.cal1.cn/post/HTTP%20Response%20Header%20Injection%20in%20Swoole%3C%3D4.5.2 - report: https://portswigger.net/kb/issues/00200200_http-response-header-injection
The text was updated successfully, but these errors were encountered:
Swoole is an event-driven, asynchronous, coroutine-based concurrency library with high performance for PHP.
Sorry, something went wrong.
Change https://go.dev/cl/514636 mentions this issue: data/excluded: batch add 31 excluded reports
data/excluded: batch add 31 excluded reports
2439098
neild
No branches or pull requests
CVE-2020-24275 references github.com/swoole/swoole-src, which may be a Go module.
Description:
A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers to execute arbitrary code via supplying a crafted URL.
References:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: