Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
References
Link | Resource |
---|---|
https://go.dev/cl/409874 | Patch Vendor Advisory |
https://pkg.go.dev/vuln/GO-2022-0525 | Vendor Advisory |
https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f | Patch Vendor Advisory |
https://go.dev/cl/410714 | Patch Vendor Advisory |
https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE | Release Notes Vendor Advisory |
https://go.dev/issue/53188 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
Information
Published : 2022-08-10 13:15
Updated : 2023-03-03 07:36
NVD link : CVE-2022-1705
Mitre link : CVE-2022-1705
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
golang
- go