The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
Interpretation Conflict
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
2.8
-
-
2.8
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
BIT-2023-29406
-
BIT-golang-2023-29406
-
2.8
-
-
-
-
-
-
-
-
-
CVE-2023-29406
-
CVE-2023-29406
-