CVE-2019-9741

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:golang:go:1.11.5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:13

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/', 'name': 'FEDORA-2019-d05bc7e3df', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/ -

22 Mar 2021, 13:05

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1519 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1519 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/04/msg00007.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/04/msg00007.html - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/107432 - (BID) http://www.securityfocus.com/bid/107432 - Third Party Advisory, VDB Entry
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1300 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1300 - Third Party Advisory

13 Mar 2021, 21:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html -

Information

Published : 2019-03-13 08:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-9741

Mitre link : CVE-2019-9741

CVE.ORG link : CVE-2019-9741


JSON object : View

Products Affected

redhat

  • developer_tools
  • enterprise_linux

fedoraproject

  • fedora

golang

  • go

debian

  • debian_linux
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')