Improper header parsing. An attacker could sneak in a carriage return character (\r
) and pass untrusted values in both the header names and values.
The issue is patched in 1.8.4 and 2.1.1.
There are no known workarounds.
{ "nvd_published_at": "2022-03-21T19:15:00Z", "cwe_ids": [ "CWE-20" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-03-25T19:26:33Z" }