Vulnerability Description
apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apt-Cacher-Ng Project | Apt-Cacher-Ng | <= 3.3 |
| Apt-Cacher Project | Apt-Cacher | <= 1.7.13 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858739PatchThird Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858833PatchThird Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858739PatchThird Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858833PatchThird Party Advisory
FAQ
What is CVE-2017-7443?
CVE-2017-7443 is a vulnerability with a CVSS score of 6.1 (MEDIUM). apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow HTTP response splitting via encoded newline characters, related to lack of blocking for the %0[ad] regular expression.
How severe is CVE-2017-7443?
CVE-2017-7443 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7443?
Check the references section above for vendor advisories and patch information. Affected products include: Apt-Cacher-Ng Project Apt-Cacher-Ng, Apt-Cacher Project Apt-Cacher.