The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
Interpretation Conflict
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in