Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
References
Link | Resource |
---|---|
https://go.dev/cl/409874 | Patch Vendor Advisory |
https://go.dev/cl/410714 | Patch Vendor Advisory |
https://go.dev/issue/53188 | Exploit Issue Tracking Patch Vendor Advisory |
https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f | Patch Vendor Advisory |
https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE | Release Notes Vendor Advisory |
https://pkg.go.dev/vuln/GO-2022-0525 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2022-08-10 20:15
Updated : 2023-11-07 03:42
NVD link : CVE-2022-1705
Mitre link : CVE-2022-1705
CVE.ORG link : CVE-2022-1705
JSON object : View
Products Affected
golang
- go
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')