{"id":"CVE-2019-3462","details":"Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.","modified":"2026-03-12T23:20:14.258508Z","published":"2019-01-28T21:29:00.300Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106690"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190125-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3863-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3863-2/"},{"type":"FIX","url":"https://www.debian.org/security/2019/dsa-4371"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.2.30"}]},{"events":[{"introduced":"1.3"},{"last_affected":"1.4.8"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-3462.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}