Lucene search

K
cve[email protected]CVE-2022-41721
HistoryJan 13, 2023 - 11:15 p.m.

CVE-2022-41721

2023-01-1323:15:09
CWE-444
web.nvd.nist.gov
215
cve-2022-41721
maxbyteshandler
request smuggling
http2
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Affected configurations

NVD
Node
golangh2cRange<2022-11-04go
CPENameOperatorVersion
golang:h2cgolang h2clt2022-11-04

CNA Affected

[
  {
    "vendor": "golang.org/x/net",
    "product": "golang.org/x/net/http2/h2c",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "golang.org/x/net/http2/h2c",
    "versions": [
      {
        "version": "0.0.0-20220524220425-1d687d428aca",
        "lessThan": "0.1.1-0.20221104162952-702349b0e862",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "h2cHandler.ServeHTTP"
      },
      {
        "name": "h2cUpgrade"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%