An issue was discovered in Netdata 1.10.0. HTTP Header Injection exists via the api/v1/data filename parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
References
Link | Resource |
---|---|
https://www.red4sec.com/cve/netdata_header_injection.txt | Exploit Third Party Advisory |
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | Patch Third Party Advisory |
https://github.com/netdata/netdata/blob/798c141c49ee85bddc8f48f25d2cb593ec96da07/web/api/web_api_v1.c#L367-L370 | Third Party Advisory |
https://github.com/netdata/netdata/pull/4521 | Third Party Advisory |
Configurations
Information
Published : 2019-06-18 09:15
Updated : 2019-06-19 06:54
NVD link : CVE-2018-18837
Mitre link : CVE-2018-18837
JSON object : View
CWE
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Products Affected
my-netdata
- netdata