CVE-2024-45597

Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. Scripts passing user-controlled values to http.request header values are affected. An attacker could use this to send arbitrary requests, potentially leveraging authentication tokens provided in the same headers table.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pluto-lang:pluto:*:*:*:*:*:*:*:*

History

05 Mar 2025, 14:53

Type Values Removed Values Added
CPE cpe:2.3:a:pluto-lang:pluto:*:*:*:*:*:*:*:*
First Time Pluto-lang
Pluto-lang pluto
References () https://github.com/PlutoLang/Pluto/pull/945 - () https://github.com/PlutoLang/Pluto/pull/945 - Patch
References () https://github.com/PlutoLang/Pluto/security/advisories/GHSA-w8xp-pmx2-37w7 - () https://github.com/PlutoLang/Pluto/security/advisories/GHSA-w8xp-pmx2-37w7 - Vendor Advisory

11 Sep 2024, 16:26

Type Values Removed Values Added
Summary
  • (es) Pluto es un superconjunto de Lua 5.4 que se centra en la programación de uso general. Los scripts que pasan valores controlados por el usuario a los valores del encabezado http.request se ven afectados. Un atacante podría utilizar esto para enviar solicitudes arbitrarias, aprovechando potencialmente los tokens de autenticación proporcionados en la misma tabla de encabezados.

10 Sep 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-10 22:15

Updated : 2025-03-05 14:53


NVD link : CVE-2024-45597

Mitre link : CVE-2024-45597

CVE.ORG link : CVE-2024-45597


JSON object : View

Products Affected

pluto-lang

  • pluto
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')