First published: Wed Mar 13 2019(Updated: )
An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | =1.11.5 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =29 | |
Redhat Developer Tools | =1.0 | |
Redhat Enterprise Linux | =8.0 | |
redhat/Go | <1.12.1 | 1.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9741 is a vulnerability discovered in net/http in Go 1.11.5 that allows for CRLF injection if the attacker controls a URL parameter.
The severity of CVE-2019-9741 is medium (6.1).
CVE-2019-9741 affects Golang Go version 1.11.5.
CVE-2019-9741 affects Debian Debian Linux version 8.0 and 9.0.
CVE-2019-9741 affects Fedora Fedora version 29.
CVE-2019-9741 affects Redhat Developer Tools version 1.0.
CVE-2019-9741 affects Redhat Enterprise Linux version 8.0.
To fix CVE-2019-9741, update Golang Go to version 1.12.1 or higher.
You can find more information about CVE-2019-9741 at the following references: [Link 1](http://www.securityfocus.com/bid/107432), [Link 2](https://access.redhat.com/errata/RHSA-2019:1300), [Link 3](https://access.redhat.com/errata/RHSA-2019:1519).