Source: cpp-httplib
Version: 0.18.7-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for cpp-httplib.

CVE-2026-33745[0]:
| cpp-httplib is a C++11 single-file header-only cross platform
| HTTP/HTTPS library. Prior to 0.39.0, the cpp-httplib HTTP client
| forwards stored Basic Auth, Bearer Token, and Digest Auth
| credentials to arbitrary hosts when following cross-origin HTTP
| redirects (301/302/307/308). A malicious or compromised server can
| redirect the client to an attacker-controlled host, which then
| receives the plaintext credentials in the `Authorization` header.
| Version 0.39.0 fixes the issue.

Note, we have a relatively old version already in unstable, and I'm
not 100% sure we are have proper assessment in the security-tracker,
please double-check but I assume you will soon move to something newer
and latest for forky?

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33745
    https://www.cve.org/CVERecord?id=CVE-2026-33745
[1] 
https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-6hrp-7fq9-3qv2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to