vulnerability
Red Hat OpenShift: CVE-2023-29406: golang: net/http: insufficient sanitization of Host header
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:C/A:N) | Jul 11, 2023 | Nov 16, 2023 | Apr 11, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:N)
Published
Jul 11, 2023
Added
Nov 16, 2023
Modified
Apr 11, 2025
Description
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
Solution(s)
linuxrpm-upgrade-openshiftlinuxrpm-upgrade-openshift-clients
References
- CVE-2023-29406
- https://attackerkb.com/topics/CVE-2023-29406
- REDHAT-RHSA-2023:5530
- REDHAT-RHSA-2023:5541
- REDHAT-RHSA-2023:5721
- REDHAT-RHSA-2023:5738
- REDHAT-RHSA-2023:5933
- REDHAT-RHSA-2023:5935
- REDHAT-RHSA-2023:5947
- REDHAT-RHSA-2023:5965
- REDHAT-RHSA-2023:5974
- REDHAT-RHSA-2023:5976
- REDHAT-RHSA-2023:6031
- REDHAT-RHSA-2023:6085
- REDHAT-RHSA-2023:6115
- REDHAT-RHSA-2023:6161
- REDHAT-RHSA-2023:6296
- REDHAT-RHSA-2023:6298
- REDHAT-RHSA-2023:6346
- REDHAT-RHSA-2023:6363
- REDHAT-RHSA-2023:6402
- REDHAT-RHSA-2023:6473
- REDHAT-RHSA-2023:6474
- REDHAT-RHSA-2023:6818
- REDHAT-RHSA-2023:6840
- REDHAT-RHSA-2023:6938
- REDHAT-RHSA-2023:6939
- REDHAT-RHSA-2023:7202
- REDHAT-RHSA-2024:0293
- REDHAT-RHSA-2024:1027
- REDHAT-RHSA-2024:1383
- REDHAT-RHSA-2024:1570

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.