object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(3517)
    ["cve_code"]=>
    string(14) "CVE-2023-30589"
    ["cnnvd"]=>
    string(17) "CNNVD-202306-2131"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(7.5)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(360) "Node v20.2.0 中 http 模块的 llhttp 解析器不严格使用 CRLF 序列来分隔 HTTP 请求。这可能导致 HTTP 请求走私 (HRS)。

CR 字符(不带 LF)足以分隔 llhttp 解析器中的 HTTP 标头字段。根据 RFC7230 第 3 节,只有 CRLF 序列才应分隔每个标头字段。这会影响所有 Node.js 活动版本:v16、v18 和 v20"
    ["date"]=>
    string(10) "2024-09-19"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(6) "nodejs"
    ["repair_version"]=>
    string(17) "nodejs-12.22.11-4"
    ["repair"]=>
    string(34) "软件包升级
dnf update nodejs
"
    ["prove"]=>
    string(164) "执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    array(9) {
      [0]=>
      string(37) "https://hackerone.com/reports/2001873"
      [1]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/"
      [2]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/"
      [3]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/"
      [4]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/"
      [5]=>
      string(56) "https://security.netapp.com/advisory/ntap-20230803-0009/"
      [6]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/"
      [7]=>
      string(128) "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/"
      [8]=>
      string(56) "https://security.netapp.com/advisory/ntap-20240621-0006/"
    }
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-10-16"
    ["cve_name"]=>
    string(19) "nodejs 安全漏洞"
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(3517)
    ["cve_code"]=>
    string(14) "CVE-2023-30589"
    ["cnnvd"]=>
    string(17) "CNNVD-202306-2131"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(7.5)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(360) "Node v20.2.0 中 http 模块的 llhttp 解析器不严格使用 CRLF 序列来分隔 HTTP 请求。这可能导致 HTTP 请求走私 (HRS)。

CR 字符(不带 LF)足以分隔 llhttp 解析器中的 HTTP 标头字段。根据 RFC7230 第 3 节,只有 CRLF 序列才应分隔每个标头字段。这会影响所有 Node.js 活动版本:v16、v18 和 v20"
    ["date"]=>
    string(10) "2024-09-19"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(6) "nodejs"
    ["repair_version"]=>
    string(17) "nodejs-12.22.11-4"
    ["repair"]=>
    string(34) "软件包升级
dnf update nodejs
"
    ["prove"]=>
    string(164) "执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    string(925) "https://hackerone.com/reports/2001873;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76/;https://security.netapp.com/advisory/ntap-20230803-0009/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE/;https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF/;https://security.netapp.com/advisory/ntap-20240621-0006/"
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-10-16"
    ["cve_name"]=>
    string(19) "nodejs 安全漏洞"
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(4) "3517"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}