Description
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L1023
Release Notes, Third Party Advisory x_refsource_confirm
https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
Exploit, Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/02/04/2
Exploit, Third Party Advisory x_refsource_misc
https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
Scores
CVSS v3
6.5
EPSS
0.0109
EPSS Percentile
78.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Details
CWE
CWE-74
Status
published
Products (1)
nim-lang/nim
< 1.2.6
Published
Aug 14, 2020
Tracked Since
Feb 18, 2026