Vulnerability Details : CVE-2018-18837
An issue was discovered in Netdata 1.10.0. HTTP Header Injection exists via the api/v1/data filename parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c.
Products affected by CVE-2018-18837
- cpe:2.3:a:my-netdata:netdata:1.10.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18837
0.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18837
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2018-18837
-
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18837
-
https://www.red4sec.com/cve/netdata_header_injection.txt
Exploit;Third Party Advisory
-
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca
fixed vulnerabilities identified by red4sec.com (#4521) · netdata/netdata@92327c9 · GitHubPatch;Third Party Advisory
-
https://github.com/netdata/netdata/blob/798c141c49ee85bddc8f48f25d2cb593ec96da07/web/api/web_api_v1.c#L367-L370
netdata/web_api_v1.c at 798c141c49ee85bddc8f48f25d2cb593ec96da07 · netdata/netdata · GitHubThird Party Advisory
-
https://github.com/netdata/netdata/pull/4521
fixed vulnerabilities identified by red4sec.com by ktsaou · Pull Request #4521 · netdata/netdata · GitHubThird Party Advisory
Jump to