Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAELFjNMCrNxurM6MJ2yc2Xckm9=AVV1XcLmw_GoX6m45s39NLw@mail.gmail.com>
Date: Tue, 19 Sep 2023 12:43:45 +0200
From: Martijn Visser <martijnvisser@...che.org>
To: dev@...nk.apache.org, user <user@...nk.apache.org>, 
	user-zh <user-zh@...nk.apache.org>, news@...nk.apache.org, 
	Apache Security Team <security@...che.org>, Andrea Cosentino <ancosen@...il.com>, oss-security@...ts.openwall.com
Subject: [CVE-2023-41834] Apache Flink Stateful Functions allowed HTTP header
 injection due to Improper Neutralization of CRLF Sequences

CVE-2023-41834: Apache Flink Stateful Functions allowed HTTP header
injection due to Improper Neutralization of CRLF Sequences

Severity: moderate

Vendor:
The Apache Software Foundation

Versions Affected:
Stateful Functions 3.1.0 to 3.2.0

Description:
Improper Neutralization of CRLF Sequences in HTTP Headers in Apache
Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote
attackers to inject arbitrary HTTP headers and conduct HTTP response
splitting attacks via crafted HTTP requests. Attackers could
potentially inject malicious content into the HTTP response that is
sent to the user. This could include injecting a fake login form or
other phishing content, or injecting malicious JavaScript code that
can steal user credentials or perform other malicious actions on the
user's behalf.

Mitigation:
Users should upgrade to 3.3.0

Credit:
This issue was discovered by Andrea Cosentino from Apache Software Foundation

References:
https://flink.apache.org/security/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.