<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpp-Httplib — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cpp-httplib/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 01:16:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cpp-httplib/feed.xml" rel="self" type="application/rss+xml"/><item><title>cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects</title><link>https://feed.craftedsignal.io/briefs/2026-03-cpp-httplib-credential-leak/</link><pubDate>Fri, 27 Mar 2026 01:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cpp-httplib-credential-leak/</guid><description>The cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.</description><content:encoded><![CDATA[<p>The cpp-httplib library, a C++11 single-file header-only cross platform HTTP/HTTPS library, contains a vulnerability (CVE-2026-33745) in versions prior to 0.39.0. This flaw allows an attacker to potentially steal sensitive credentials by exploiting the library&rsquo;s behavior when handling cross-origin HTTP redirects (301, 302, 307, 308). Specifically, stored Basic Auth, Bearer Token, and Digest Auth credentials are unintentionally forwarded to arbitrary hosts during these redirects. This means a compromised server or a malicious actor can redirect a client using the vulnerable library to a host under their control, effectively capturing the plaintext credentials within the <code>Authorization</code> header. Upgrading to version 0.39.0 resolves this vulnerability. This is critical because it impacts any application using the vulnerable version of the library and relying on HTTP authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises or sets up a malicious HTTP server.</li>
<li>Attacker crafts a response that includes an HTTP redirect (301, 302, 307, or 308) to a domain controlled by the attacker. This redirect targets a resource on the attacker&rsquo;s controlled domain.</li>
<li>A client application using a vulnerable version of cpp-httplib (prior to 0.39.0) attempts to access a resource on the compromised or malicious server.</li>
<li>The cpp-httplib library in the client application receives the HTTP redirect response.</li>
<li>The vulnerable library incorrectly appends any stored <code>Authorization</code> headers (Basic Auth, Bearer Token, or Digest Auth) to the redirected request, even though it&rsquo;s a cross-origin request.</li>
<li>The client application, through cpp-httplib, sends the redirected request to the attacker-controlled host, including the sensitive <code>Authorization</code> header.</li>
<li>The attacker captures the <code>Authorization</code> header, extracting the plaintext credentials.</li>
<li>The attacker uses the stolen credentials to impersonate the user or gain unauthorized access to protected resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33745 allows attackers to steal authentication credentials from applications utilizing the vulnerable cpp-httplib library. The impact could range from unauthorized access to user accounts and sensitive data to full compromise of the application and its related systems. The number of potential victims depends on the usage and distribution of the vulnerable cpp-httplib library across different software projects and organizations. Organizations across all sectors are potentially vulnerable if they use affected applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to cpp-httplib version 0.39.0 or later to remediate CVE-2026-33745 as mentioned in the <strong>Overview</strong>.</li>
<li>Implement network monitoring to detect HTTP requests containing <code>Authorization</code> headers being sent to unexpected or untrusted domains, based on the attack chain steps described above, specifically step 6.</li>
<li>If upgrading is not immediately feasible, consider implementing a proxy that strips <code>Authorization</code> headers from HTTP redirect requests to external domains as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cpp-httplib</category><category>credential-leak</category><category>cve-2026-33745</category><category>http-redirect</category><category>credential-access</category><category>cross-origin</category></item></channel></rss>