{"vulnerability": "CVE-2023-22465", "sightings": [{"uuid": "168c14f9-7335-4c55-8212-6e478d9747c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22465", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7063", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-22465\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Http4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs.  In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface.\n\ud83d\udccf Published: 2023-01-04T15:30:04.129Z\n\ud83d\udccf Modified: 2025-03-10T21:32:44.734Z\n\ud83d\udd17 References:\n1. https://github.com/http4s/http4s/security/advisories/GHSA-54w6-vxfh-fw7f", "creation_timestamp": "2025-03-10T21:39:15.000000Z"}, {"uuid": "352be572-0f9d-40aa-bfe7-70b6e52dc55d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22465", "type": "seen", "source": "https://t.me/cibsecurity/55895", "content": "\u203c CVE-2023-22465 \u203c\n\nHttp4s is a Scala interface for HTTP services. Starting with version 0.1.0 and prior to versions 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38, the `User-Agent` and `Server` header parsers are susceptible to a fatal error on certain inputs. In http4s, modeled headers are lazily parsed, so this only applies to services that explicitly request these typed headers. Fixes are released in 0.21.34, 0.22.15, 0.23.17, and 1.0.0-M38. As a workaround, use the weakly typed header interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T18:18:17.000000Z"}]}