First published: Tue Sep 19 2023(Updated: )
Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests. Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Flink Stateful Functions | >=3.1.0<=3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41834 is a vulnerability in Apache Flink Stateful Functions that allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests.
The severity of CVE-2023-41834 is medium with a score of 6.1.
Apache Flink Stateful Functions versions 3.1.0, 3.1.1, and 3.2.0 are affected by CVE-2023-41834.
Remote attackers can exploit CVE-2023-41834 by injecting arbitrary HTTP headers and conducting HTTP response splitting attacks via crafted HTTP requests.
Yes, there are references available for CVE-2023-41834: http://www.openwall.com/lists/oss-security/2023/09/19/3, https://lists.apache.org/thread/cvxcsdyjqc3lysj1tz7s06zwm36zvwrm