Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-38697
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-04 Aug, 2023 | 17:32
Updated At-04 Oct, 2024 | 19:39
Rejected At-
▼CVE Numbering Authority (CNA)
protocol-http1 HTTP Request/Response Smuggling vulnerability

protocol-http1 provides a low-level implementation of the HTTP/1 protocol. RFC 9112 Section 7.1 defined the format of chunk size, chunk data and chunk extension. The value of Content-Length header should be a string of 0-9 digits, the chunk size should be a string of hex digits and should split from chunk data using CRLF, and the chunk extension shouldn't contain any invisible character. However, Falcon has following behaviors while disobey the corresponding RFCs: accepting Content-Length header values that have `+` prefix, accepting Content-Length header values that written in hexadecimal with `0x` prefix, accepting `0x` and `+` prefixed chunk size, and accepting LF in chunk extension. This behavior can lead to desync when forwarding through multiple HTTP parsers, potentially results in HTTP request smuggling and firewall bypassing. This issue is fixed in `protocol-http1` v0.15.1. There are no known workarounds.

Affected Products
Vendor
socketry
Product
protocol-http1
Versions
Affected
  • < 0.15.1
Problem Types
TypeCWE IDDescription
CWECWE-444CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Metrics
VersionBase scoreBase severityVector
3.15.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj
x_refsource_CONFIRM
https://github.com/socketry/protocol-http1/pull/20
x_refsource_MISC
https://github.com/socketry/protocol-http1/commit/e11fc164fd2b36f7b7e785e69fa8859eb06bcedd
x_refsource_MISC
https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj
x_refsource_CONFIRM
x_transferred
https://github.com/socketry/protocol-http1/pull/20
x_refsource_MISC
x_transferred
https://github.com/socketry/protocol-http1/commit/e11fc164fd2b36f7b7e785e69fa8859eb06bcedd
x_refsource_MISC
x_transferred
https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
socketry
Product
protocol-http1
CPEs
  • cpe:2.3:a:socketry:protocol-http1:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 0.15.1 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found