CVE-2020-11709
Homebrew vulnerability analysis and mitigation

Overview

CVE-2020-11709 was a CRLF Injection vulnerability discovered in the cpp-httplib library affecting versions prior to 0.5.9. The vulnerability was found in the set_redirect and set_header functions, which were susceptible to HTTP response splitting attacks when handling untrusted user input (GitHub Issue).

Technical details

The vulnerability existed in the library's Response class methods set_header and set_redirect, where user input was not properly sanitized for CRLF sequences. The code did not validate or escape the input parameters before using them in HTTP headers, allowing attackers to inject malicious CRLF sequences that could lead to HTTP response splitting attacks (GitHub POC).

Impact

The vulnerability could allow attackers to perform HTTP response splitting attacks by injecting CRLF sequences in header values. This could lead to response manipulation, cache poisoning, and potential cross-site scripting (XSS) attacks, compromising the security of applications using the affected library versions.

Mitigation and workarounds

The vulnerability was fixed in cpp-httplib version 0.5.9. Users were advised to upgrade to this version or later to address the security issue. The fix involved proper validation and sanitization of input used in HTTP headers (GitHub Issue).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22861HIGH8.8
  • HomebrewHomebrew
  • iccdev
NoYesJan 13, 2026
CVE-2026-22776HIGH8.7
  • HomebrewHomebrew
  • cpp-httplib
NoYesJan 12, 2026
CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-21283HIGH7.8
  • Adobe BridgeAdobe Bridge
  • bridge
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management