blob: 448f69130d900cc9b38349b4395e8105bf57914e [file] [log] [blame]
packages:
- module: std
package: net/http
symbols:
- transferReader.parseTransferEncoding
versions:
- fixed: 1.17.12
- introduced: 1.18.0
fixed: 1.18.4
vulnerable_at: 1.18.3
description: |
The HTTP/1 client accepted some invalid Transfer-Encoding headers as
indicating a "chunked" encoding. This could potentially allow for request
smuggling, but only if combined with an intermediate server that also
improperly failed to reject the header as invalid.
credit: Zeyu Zhang (https://www.zeyu2001.com/)
links:
pr: https://go.dev/cl/409874
commit: https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f
context:
- https://go.dev/issue/53188
- https://go.dev/cl/410714
- https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-1705
cwe: "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')"
description: |
Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client
in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling
if combined with an intermediate server that also improperly fails to
reject the header as invalid.