EEF-CVE-2026-43969

Source
https://cna.erlef.org/osv/EEF-CVE-2026-43969.html
Import Source
https://cna.erlef.org/osv/EEF-CVE-2026-43969.json
JSON Data
https://api.osv.dev/v1/vulns/EEF-CVE-2026-43969
Aliases
  • CVE-2026-43969
Published
2026-05-11T18:06:40.667Z
Modified
2026-05-12T04:26:34.206Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N CVSS Calculator
Summary
Cookie Request Header Injection via Unvalidated Encoder in cow_cookie:cookie/1
Details

Summary

Improper Neutralization of CRLF Sequences ('CRLF Injection') vulnerability in ninenines cowlib allows HTTP request splitting and cookie smuggling via unvalidated cookie name and value fields.

cowcookie:cookie/1 in cowlib builds a client-side Cookie: request header from a list of name-value pairs without validating either field. An attacker who controls the cookie names or values passed to this function can inject ;, ,, CR, LF, or TAB characters into the serialized header. This enables two classes of attack: cookie smuggling within a single header (e.g. injecting "; admin=1" to introduce a phantom cookie that the receiving server treats as authentic) and HTTP request header splitting (injecting CRLF to append arbitrary headers or smuggle a complete second request against a shared upstream proxy). The decoder side (parsecookiename/1, parsecookie_value/1) and setcookie/3 already validate and reject these characters; the encoder alone is missing the check.

This issue affects cowlib from 2.9.0.

Workaround

Validate inputs into cow_cookie:cookie/1 to only include valid cookie name and value characters as defined in RFC 6265 Section 4.1.1 before passing them to the function.

Configuration

The application must pass attacker-controlled bytes as cookie names or values to cow_cookie:cookie/1. Applications that construct cookie lists exclusively from trusted, application-controlled values are not affected.

Database specific
{
    "cpe_ids": [
        "cpe:2.3:a:ninenines:cowlib:*:*:*:*:*:*:*:*"
    ],
    "cwe_ids": [
        "CWE-93"
    ],
    "capec_ids": [
        "CAPEC-105"
    ]
}
References
Credits
    • Peter Ullrich - FINDER

Affected packages

Hex / cowlib

Package

Name
cowlib
Purl
pkg:hex/cowlib

Affected ranges

Type
SEMVER
Events
Introduced
2.9.0

Affected versions

2.*
2.9.0
2.9.1
2.10.0
2.10.1
2.11.0
2.12.0
2.12.1
2.13.0
2.14.0
2.15.0
2.16.0

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-43969.json"

Git / github.com/ninenines/cowlib

Affected ranges

Type
GIT
Repo
https://github.com/ninenines/cowlib
Events

Database specific

source
"https://cna.erlef.org/osv/EEF-CVE-2026-43969.json"