Source: cpp-httplib
Version: 0.18.7-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for cpp-httplib.

CVE-2026-32627[0]:
| cpp-httplib is a C++11 single-file header-only cross platform
| HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is
| configured with a proxy and set_follow_location(true), any HTTPS
| redirect it follows will have TLS certificate and hostname
| verification silently disabled on the new connection. The client
| will accept any certificate presented by the redirect target —
| expired, self-signed, or forged — without raising an error or
| notifying the application. A network attacker in a position to
| return a redirect response can fully intercept the follow-up HTTPS
| connection, including any credentials or session tokens in flight.
| This vulnerability is fixed in 0.37.2.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-32627
    https://www.cve.org/CVERecord?id=CVE-2026-32627
[1] 
https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-c3h8-fqq4-xm4g

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to