CVE-2026-1467

5.8 MEDIUM

📋 TL;DR

This CRLF injection vulnerability in libsoup allows attackers to inject malicious HTTP headers or request bodies when an HTTP proxy is configured. It affects applications using vulnerable libsoup versions with proxy support enabled. Attackers can manipulate proxy behavior to send unauthorized requests to downstream services.

💻 Affected Systems

Products:
  • libsoup
  • applications using libsoup for HTTP client functionality
Versions: Specific version range not provided in CVE description; check vendor advisories for affected versions.
Operating Systems: Linux distributions shipping libsoup, Any OS using vulnerable libsoup versions
Default Config Vulnerable: ✅ No
Notes: Requires HTTP proxy configuration to be vulnerable. Applications must use libsoup's proxy support with URL-decoded input for Host headers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject complete HTTP requests through the proxy, potentially accessing internal services, performing SSRF attacks, or manipulating proxy cache behavior.

🟠

Likely Case

Header injection allowing manipulation of proxy behavior, potentially enabling request smuggling or cache poisoning attacks.

🟢

If Mitigated

Limited impact with proper input validation and proxy configuration restrictions in place.

🌐 Internet-Facing: MEDIUM - Requires HTTP proxy configuration and attacker-controlled URLs, but exploitation is straightforward once conditions are met.
🏢 Internal Only: LOW - Primarily affects systems with proxy configurations, which are less common in purely internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires attacker to control URL input that gets URL-decoded and used in Host header construction with proxy enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor-specific updates (e.g., Red Hat, Ubuntu, Debian security advisories)

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2026-1467

Restart Required: Yes

Instructions:

1. Check your distribution's security advisories. 2. Update libsoup package using system package manager. 3. Restart affected applications/services using libsoup.

🔧 Temporary Workarounds

Disable HTTP proxy support

all

Configure applications to not use HTTP proxy functionality in libsoup if not required.

Application-specific configuration; set proxy settings to 'none' or direct connection

Input validation for URLs

all

Implement strict validation and sanitization of URL inputs before passing to libsoup.

Application code changes required; validate URLs don't contain CRLF sequences

🧯 If You Can't Patch

  • Implement WAF rules to block requests containing CRLF sequences in URLs
  • Use network segmentation to isolate proxy servers from sensitive internal services

🔍 How to Verify

Check if Vulnerable:

Check libsoup version and verify if HTTP proxy functionality is enabled in applications.

Check Version:

pkg-config --modversion libsoup-2.4 (or appropriate version) or check package manager

Verify Fix Applied:

Verify updated libsoup version and test proxy functionality with CRLF sequences to ensure they're properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with CRLF sequences in URLs
  • Proxy logs showing malformed Host headers

Network Indicators:

  • HTTP requests containing %0D%0A or other CRLF encodings in URL parameters

SIEM Query:

http.url CONTAINS "%0D%0A" OR http.url CONTAINS "\r\n"

🔗 References

📤 Share & Export