CVE-2019-9741

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:golang:go:1.11.5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Information

Published : 2019-03-13 01:29

Updated : 2021-03-22 06:05


NVD link : CVE-2019-9741

Mitre link : CVE-2019-9741


JSON object : View

CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Advertisement

dedicated server usa

Products Affected

redhat

  • developer_tools
  • enterprise_linux

fedoraproject

  • fedora

golang

  • go

debian

  • debian_linux