The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://seclists.org/oss-sec/2015/q3/292 | mailing-list x_refsource_MLIST |
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.html | vendor-advisory x_refsource_FEDORA |
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.html | vendor-advisory x_refsource_FEDORA |
http://rhn.redhat.com/errata/RHSA-2016-1538.html | vendor-advisory x_refsource_REDHAT |
https://bugzilla.redhat.com/show_bug.cgi?id=1250352 | x_refsource_CONFIRM |
http://seclists.org/oss-sec/2015/q3/294 | mailing-list x_refsource_MLIST |
http://seclists.org/oss-sec/2015/q3/237 | mailing-list x_refsource_MLIST |
https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680f | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://seclists.org/oss-sec/2015/q3/292 | mailing-list x_refsource_MLIST x_transferred |
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.html | vendor-advisory x_refsource_FEDORA x_transferred |
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.html | vendor-advisory x_refsource_FEDORA x_transferred |
http://rhn.redhat.com/errata/RHSA-2016-1538.html | vendor-advisory x_refsource_REDHAT x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=1250352 | x_refsource_CONFIRM x_transferred |
http://seclists.org/oss-sec/2015/q3/294 | mailing-list x_refsource_MLIST x_transferred |
http://seclists.org/oss-sec/2015/q3/237 | mailing-list x_refsource_MLIST x_transferred |
https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680f | x_refsource_CONFIRM x_transferred |
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 9.8 | CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |