Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-41530 | Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. Scripts passing user-controlled values to http.request header values are affected. An attacker could use this to send arbitrary requests, potentially leveraging authentication tokens provided in the same headers table. |
Wed, 05 Mar 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pluto-lang
Pluto-lang pluto |
|
| CPEs | cpe:2.3:a:pluto-lang:pluto:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pluto-lang
Pluto-lang pluto |
Wed, 11 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pluto
Pluto pluto |
|
| CPEs | cpe:2.3:a:pluto:pluto:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pluto
Pluto pluto |
|
| Metrics |
ssvc
|
Tue, 10 Sep 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. Scripts passing user-controlled values to http.request header values are affected. An attacker could use this to send arbitrary requests, potentially leveraging authentication tokens provided in the same headers table. | |
| Title | Pluto's http.request allows CR and LF in header values | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-11T13:28:10.303Z
Reserved: 2024-09-02T16:00:02.423Z
Link: CVE-2024-45597
Updated: 2024-09-11T13:27:59.240Z
Status : Analyzed
Published: 2024-09-10T22:15:01.967
Modified: 2025-03-05T14:53:25.190
Link: CVE-2024-45597
No data.
OpenCVE Enrichment
No data.
EUVD