A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
References
Link | Resource |
---|---|
https://go.dev/cl/447396 | Patch Vendor Advisory |
https://go.dev/issue/56352 | Exploit Issue Tracking Patch Vendor Advisory |
https://pkg.go.dev/vuln/GO-2023-1495 | Vendor Advisory |
Configurations
Information
Published : 2023-01-13 15:15
Updated : 2023-01-24 09:25
NVD link : CVE-2022-41721
Mitre link : CVE-2022-41721
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
golang
- h2c