HTTP Response Splitting Affecting restsharp package, versions [107.0.0-preview.1,112.0.0)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (21st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DOTNET-RESTSHARP-7853196
- published 30 Aug 2024
- disclosed 29 Aug 2024
- credit sofiaml, Tanner Barnes
Introduced: 29 Aug 2024
CVE-2024-45302 Open this link in a new tabHow to fix?
Upgrade RestSharp
to version 112.0.0 or higher.
Overview
RestSharp is a Simple REST and HTTP API Client
Affected versions of this package are vulnerable to HTTP Response Splitting via the HttpHeaders.TryAddWithoutValidation
method. An attacker can manipulate HTTP headers and potentially perform HTTP request smuggling by inserting CRLF sequences into header values.
PoC
dotnet RestSharp-cli.dll $'test\r\nUser-Agent: injected header!\r\n\r\nGET /smuggled HTTP/1.1\r\nHost: insert.some.site.here'