Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface.
References
Link | Resource |
---|---|
https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7f | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 04:06
Type | Values Removed | Values Added |
---|---|---|
Summary | Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface. |
11 Jan 2023, 02:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:typelevel:http4s:1.0.0:milestone36:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone28:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone17:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone24:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone31:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone21:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone7:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone10:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone33:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone25:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone27:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone11:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone12:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone32:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone30:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone23:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone18:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone2:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone26:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone9:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone15:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone3:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone34:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone16:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone5:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone4:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone19:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone6:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone14:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone22:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone8:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone13:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone37:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:*:*:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone29:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone35:*:*:*:*:*:* cpe:2.3:a:typelevel:http4s:1.0.0:milestone20:*:*:*:*:*:* |
|
First Time |
Typelevel http4s
Typelevel |
|
References | (MISC) https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7f - Exploit, Mitigation, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
04 Jan 2023, 17:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-04 16:15
Updated : 2023-12-10 14:48
NVD link : CVE-2023-22465
Mitre link : CVE-2023-22465
CVE.ORG link : CVE-2023-22465
JSON object : View
Products Affected
typelevel
- http4s
CWE
CWE-20
Improper Input Validation