blob: c6c63a4ee45942e3a173ce83719521f75ec841c9 [file] [log] [blame]
modules:
- module: golang.org/x/net
versions:
- introduced: 0.0.0-20220524220425-1d687d428aca
fixed: 0.1.1-0.20221104162952-702349b0e862
vulnerable_at: 0.1.1-0.20221104145632-7a676822c292
packages:
- package: golang.org/x/net/http2/h2c
symbols:
- h2cHandler.ServeHTTP
- h2cUpgrade
description: |
A request smuggling attack is possible when using MaxBytesHandler.
When using MaxBytesHandler, the body of an HTTP request is not fully
consumed. When the server attempts to read HTTP2 frames from the
connection, it will instead be reading the body of the HTTP request,
which could be attacker-manipulated to represent arbitrary HTTP2 requests.
ghsas:
- GHSA-fxg5-wq6x-vr4w
credit: John Howard (Google)
references:
- report: https://go.dev/issue/56352
- fix: https://go.dev/cl/447396
cve_metadata:
id: CVE-2022-41721
cwe: 'CWE 444: Inconsistent Interpretation of HTTP Requests ("HTTP Request/Response
Smuggling)'