CVE-2023-29406

SOURCE - nist

Summary

The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.

EPSS Score: 0.00065 (0.284)

Common Weakness Enumeration (CWE)

SOURCE - nist

Interpretation Conflict

SOURCE - redhat

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in