Source: cpp-httplib Version: 0.18.7-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for cpp-httplib. CVE-2026-28434[0]: | cpp-httplib is a C++11 single-file header-only cross platform | HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a | C++ exception and the application has not registered a custom | exception handler via set_exception_handler(), the library catches | the exception and writes its message directly into the HTTP response | as a header named EXCEPTION_WHAT. This header is sent to whoever | made the request, with no authentication check and no special | configuration required to trigger it. The behavior is on by default. | A developer who does not know to opt in to set_exception_handler() | will ship a server that leaks internal exception messages to any | client. This vulnerability is fixed in 0.35.0. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-28434 https://www.cve.org/CVERecord?id=CVE-2026-28434 [1] https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-8mpw-r4gc-xm7q [2] https://github.com/yhirose/cpp-httplib/commit/defd907c7469c5c8281247b73bbd07be24c31164 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

