CVE-2022-41721

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-41721
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41721.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-41721
Aliases
Related
Published
2023-01-13T23:15:09Z
Modified
2024-09-18T01:00:20Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

References

Affected packages

Debian:12 / golang-golang-x-net

Package

Name
golang-golang-x-net
Purl
pkg:deb/debian/golang-golang-x-net?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.4.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / golang-golang-x-net

Package

Name
golang-golang-x-net
Purl
pkg:deb/debian/golang-golang-x-net?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.4.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}