CVE Vulnerabilities

CVE-2019-9741

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Mar 13, 2019 | Modified: Nov 21, 2024
CVSS 3.x
6.1
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with rn followed by an HTTP header or a Redis command.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

NameVendorStart VersionEnd Version
GoGolang1.11.5 (including)1.11.5 (including)
Red Hat Developer ToolsRedHatgo-toolset-1.11-0:1.11.5-2.el7*
Red Hat Developer ToolsRedHatgo-toolset-1.11-golang-0:1.11.5-3.el7*
Red Hat Enterprise Linux 8RedHatgo-toolset:rhel8-8000020190509153318.b9255456*
GolangUbuntutrusty*
Golang-1.10Ubuntubionic*
Golang-1.10Ubuntucosmic*
Golang-1.10Ubuntudisco*
Golang-1.10Ubuntuesm-infra/bionic*
Golang-1.10Ubuntutrusty*
Golang-1.10Ubuntutrusty/esm*
Golang-1.10Ubuntuxenial*
Golang-1.11Ubuntudisco*
Golang-1.11Ubuntuupstream*
Golang-1.6Ubuntutrusty*
Golang-1.6Ubuntuxenial*
Golang-1.7Ubuntucosmic*
Golang-1.8Ubuntubionic*
Golang-1.8Ubuntucosmic*
Golang-1.8Ubuntuesm-apps/bionic*
Golang-1.9Ubuntubionic*
Golang-1.9Ubuntucosmic*
Golang-1.9Ubuntuesm-apps/bionic*

Potential Mitigations

References