Vulnerability Description
Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typelevel | Http4S | >= 0.1.0, < 0.21.34 |
Related Weaknesses (CWE)
References
- https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7fExploitMitigationThird Party Advisory
- https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7fExploitMitigationThird Party Advisory
FAQ
What is CVE-2023-22465?
CVE-2023-22465 is a vulnerability with a CVSS score of 7.5 (HIGH). Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible ...
How severe is CVE-2023-22465?
CVE-2023-22465 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22465?
Check the references section above for vendor advisories and patch information. Affected products include: Typelevel Http4S.