The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
References
Link | Resource |
---|---|
https://go.dev/cl/506996 | Patch |
https://go.dev/issue/60374 | Issue Tracking Patch |
https://groups.google.com/g/golang-announce/c/2q13H6LEEx0 | Mailing List |
https://pkg.go.dev/vuln/GO-2023-1878 | Vendor Advisory |
https://security.gentoo.org/glsa/202311-09 | |
https://security.netapp.com/advisory/ntap-20230814-0002/ |
Configurations
History
No history.
Information
Published : 2023-07-11 20:15
Updated : 2023-11-25 11:15
NVD link : CVE-2023-29406
Mitre link : CVE-2023-29406
CVE.ORG link : CVE-2023-29406
JSON object : View
Products Affected
golang
- go
CWE
CWE-436
Interpretation Conflict