goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
{ "nvd_published_at": "2020-06-10T16:15:00Z", "github_reviewed_at": "2021-05-13T17:20:47Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-444" ] }