golang: HTTP request smuggling
Package(s): | golang |
CVE #(s): | CVE-2015-5739
CVE-2015-5740
CVE-2015-5741
|
Created: | August 18, 2015 |
Updated: | July 28, 2016 |
Description: |
From the Red Hat bugzilla entry:
There have been found potentially exploitable flaws in Golang net/http library affecting versions 1.4.2 and 1.5.
Problems:
* Double Content-length headers in a request does not generate a 400 error, the second Content-length is ignored.
* Invalid headers are parsed as valid headers (like "Content Length:" with a space in the middle)
Exploitations:
In a situation where the net/http agent HTTP communication with the final
http clients is using some reverse proxy (reverse proxy cache, SSL
terminators, etc), some requests can be made exploiting the net/http HTTP
protocol violations. |
Alerts: |
|