Fedora 43 : cpp-httplib (2026-e76feaf213)

high Nessus Plugin ID 304453

Synopsis

The remote Fedora host is missing one or more security updates.

Description

The remote Fedora 43 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-e76feaf213 advisory.

# Update to 0.38.0 (rhbz#2447261)


- Filename sanitization for path traversal prevention Added sanitize_filename() to prevent path traversal attacks via malicious filenames in multipart uploads (83e98a2)
- Symlink protection in static file server Static file serving now detects and rejects symlinks that point outside the mount directory, preventing symlink-based directory traversal (f787f31)


- Brotli compression support Added Brotli (br) as a supported content encoding alongside gzip and deflate (ec1ffbc)
- Accept-Encoding quality parameter parsing The server now parses q= quality values in the Accept- Encoding header and selects the best encoding accordingly (bb7c7ab)
- SSL proxy connection support SSLClient can now establish connections through HTTPS proxies, with a new setup_proxy_connection method for cleaner proxy handling (f6ed5fc, b1bb2b7)
- WebSocket ping interval runtime configuration WebSocket ping interval can now be configured at runtime instead of only at compile time (257b266)


- Benchmark test suite Added benchmark tests and configurations for performance evaluation (ba0d0b8)
- Unicode path component decoding tests Added test coverage for Unicode characters in decode_path_component (43a54a3)
- Documentation updates Enhanced TLS backend documentation with platform-specific certificate handling details; clarified progress callback usage and user data handling in examples (511e3ef, 2e61fd3)


- Fix port conflict in test Fixed port number in OpenStreamMalformedContentLength test to avoid conflicts (4978f26)


- Removed large data tests for GzipDecompressor and SSLClientServerTest that caused memory issues (5ecba74, 69d468f)
- Enabled BindDualStack test (69d468f)

Source: https://github.com/yhirose/cpp-httplib/releases/tag/v0.38.0


- Fixes silent TLS certificate verification bypass on HTTPS Redirect via proxy ([CVE-2026-32627](https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-c3h8-fqq4-xm4g), rhbz#2448105)

Source: https://github.com/yhirose/cpp-httplib/releases/tag/v0.37.2

[//]: # (#2448104 NEW - [email protected] - CVE-2026-32627 cpp-httplib: silent TLS certificate verification bypass on HTTPS Redirect via proxy [epel-all]) [//]: # (#2448105 CLOSED - [email protected] - CVE-2026-32627 cpp-httplib: silent TLS certificate verification bypass on HTTPS Redirect via proxy [fedora-all]) [//]: # (#2447261 rebase)

Tenable has extracted the preceding description block directly from the Fedora security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected cpp-httplib package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2026-e76feaf213

Plugin Details

Severity: High

ID: 304453

File Name: fedora_2026-e76feaf213.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/31/2026

Updated: 3/31/2026

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-32627

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:cpp-httplib, cpe:/o:fedoraproject:fedora:43

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/23/2026

Vulnerability Publication Date: 3/13/2026

Reference Information

CVE: CVE-2026-32627