Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43969— Cookie Request Header Injection via Unvalidated Encoder in cow_cookie:cookie/1

EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43969

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cookie Request Header Injection via Unvalidated Encoder in cow_cookie:cookie/1
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper Neutralization of CRLF Sequences ('CRLF Injection') vulnerability in ninenines cowlib allows HTTP request splitting and cookie smuggling via unvalidated cookie name and value fields. cow_cookie:cookie/1 in cowlib builds a client-side Cookie: request header from a list of name-value pairs without validating either field. An attacker who controls the cookie names or values passed to this function can inject ;, ,, CR, LF, or TAB characters into the serialized header. This enables two classes of attack: cookie smuggling within a single header (e.g. injecting "; admin=1" to introduce a phantom cookie that the receiving server treats as authentic) and HTTP request header splitting (injecting CRLF to append arbitrary headers or smuggle a complete second request against a shared upstream proxy). The decoder side (parse_cookie_name/1, parse_cookie_value/1) and setcookie/3 already validate and reject these characters; the encoder alone is missing the check. This issue affects cowlib from 2.9.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对CRLF序列的转义处理不恰当(CRLF注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cowlib 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cowlib是Nine Nines开源的一个Web协议消息解析与构建库。 cowlib 2.9.0版本存在注入漏洞,该漏洞源于cow_cookie:cookie/1在cowlib中从名称值对列表构建客户端Cookie请求标头而未验证任一字段,控制cookie名称或值的攻击者可向序列化标头注入;、、、CR、LF或TAB字符,实现cookie走私和HTTP请求标头分割攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nineninescowlib 2.9.0 cpe:2.3:a:ninenines:cowlib:*:*:*:*:*:*:*:*
nineninescowlib f017f8a0ecbffd5033d9ab49bf180186f7a523a7 cpe:2.3:a:ninenines:cowlib:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-43969

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43969

登录查看更多情报信息。

Same Patch Batch · ninenines · 2026-05-11 · 3 CVEs total

CVE-2026-7790Unbounded chunk-size hex digits in cowlib cause quadratic CPU and memory DoS
CVE-2026-43968CR Injection in SSE Encoder Enables Event Splitting via cow_sse:event/1

IV. Related Vulnerabilities

V. Comments for CVE-2026-43969

No comments yet


Leave a comment