An issue was discovered in Netdata 1.10.0. HTTP Header Injection exists via the api/v1/data filename parameter because of web_client_api_request_v1_data in web/api/web_api_v1.c. Reference: https://github.com/netdata/netdata/blob/798c141c49ee85bddc8f48f25d2cb593ec96da07/web/api/web_api_v1.c#L367-L370 https://github.com/netdata/netdata/pull/4521 https://www.red4sec.com/cve/netdata_header_injection.txt Upstream commit: https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca
Created netdata tracking bugs for this issue: Affects: fedora-all [bug 1725749]
Created netdata tracking bugs for this issue: Affects: epel-all [bug 1725751]
All versions in fedora and epel (1.13 -> 1.15) are already patched by upstream (sources checked). This is a bug discovered in 2019 October and immediately patched by upstream.
*** Bug 1725749 has been marked as a duplicate of this bug. ***
*** Bug 1725751 has been marked as a duplicate of this bug. ***
*** Bug 1725747 has been marked as a duplicate of this bug. ***