Skip to content

The Umbraco Heartcore headless client library uses a vulnerable Refit dependency package

Low severity GitHub Reviewed Published Jan 13, 2025 in umbraco/Umbraco.Headless.Client.Net • Updated Jan 13, 2025

Package

nuget Umbraco.Headless.Client.Net (NuGet)

Affected versions

<= 1.4.1

Patched versions

1.5.0

Description

Impact

The Heartcore headless client library depends on Refit to assist in making HTTP requests to Heartcore public APIs. Refit recently published an advisory regarding a CRLF injection vulnerability whereby it is possible for a malicious user to smuggle additional headers or potentially body content into a request.

This shouldn't affect Heartcore client library usage as the vulnerable method - HttpHeaders.TryAddWithoutValidation - is not used. However, since Refit is a transient dependency for applications using this library, then any users making direct use of Refit could be vulnerable.

Patches

The vulnerable version of Refit has been upgraded to a secure version, as of Umbraco.Headless.Client.Net version 1.5.0, available on Nuget.

Workarounds

If calling Refit from your own code, set any necessary HTTP headers without use of HttpHeaders.TryAddWithoutValidation.

References

See the original Refit advisory for further info.

References

Published to the GitHub Advisory Database Jan 13, 2025
Reviewed Jan 13, 2025
Last updated Jan 13, 2025

Severity

Low

CVE ID

No known CVE

GHSA ID

GHSA-mgr7-5782-6jh9
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.