HTTP Response Splitting Affecting restsharp package, versions [107.0.0-preview.1,112.0.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.05% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DOTNET-RESTSHARP-7853196
  • published 30 Aug 2024
  • disclosed 29 Aug 2024
  • credit sofiaml, Tanner Barnes

How to fix?

Upgrade RestSharp to version 112.0.0 or higher.

Overview

RestSharp is a Simple REST and HTTP API Client

Affected versions of this package are vulnerable to HTTP Response Splitting via the HttpHeaders.TryAddWithoutValidation method. An attacker can manipulate HTTP headers and potentially perform HTTP request smuggling by inserting CRLF sequences into header values.

PoC

dotnet RestSharp-cli.dll $'test\r\nUser-Agent: injected header!\r\n\r\nGET /smuggled HTTP/1.1\r\nHost: insert.some.site.here'

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
6.9 medium
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    Passive
  • Confidentiality (VC)
    Low
  • Integrity (VI)
    None
  • Availability (VA)
    High
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None