go is vulnerable to Request Smuggling. The vulnerability exists because of accepting some invalid transfer-encoding header in t *transferReader
function in transfer.go
will allow the attacker to smuggle HTTP requests if combined with an intermediate server that also improperly fails to reject the header as invalid.
go.dev/cl/409874
go.dev/cl/410714
go.dev/issue/53188
go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f
groups.google.com/g/golang-announce/c/nqrv9fbR0zE
lists.fedoraproject.org/archives/list/[email protected]/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/
pkg.go.dev/vuln/GO-2022-0525
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.16/community.yaml