Lucene search

K
githubGitHub Advisory DatabaseGHSA-FXG5-WQ6X-VR4W
HistoryJan 14, 2023 - 12:30 a.m.

golang.org/x/net/http2/h2c vulnerable to request smuggling attack

2023-01-1400:30:23
CWE-444
GitHub Advisory Database
github.com
52
request smuggling
maxbyteshandler
http request
http2 requests
go packages
server vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

55.1%

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Specific Go Packages Affected

golang.org/x/net/http2/h2c

Affected configurations

Vulners
Node
xnetRange0.0.0-20220524220425-1d687d428acaโ€“0.1.1-0.20221104162952-702349b0e862
VendorProductVersionCPE
xnet*cpe:2.3:a:x:net:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

55.1%