HTTP Response Splitting The advisory has been revoked - it doesn't affect any version of package openshift-clients-redistributable  (opens in a new tab)


Threat Intelligence

EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-OPENSHIFTCLIENTSREDISTRIBUTABLE-6145818
  • published6 Jan 2024
  • disclosed11 Jul 2023

Introduced: 11 Jul 2023

CVE-2023-29406  (opens in a new tab)
CWE-113  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openshift-clients-redistributable package and not the openshift-clients-redistributable package as distributed by RHEL.

The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.