GO-2021-0159

See a problem?
Source
https://pkg.go.dev/vuln/GO-2021-0159
Import Source
https://vuln.go.dev/ID/GO-2021-0159.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2021-0159
Aliases
  • CVE-2015-5739
  • CVE-2015-5740
  • CVE-2015-5741
Published
2022-01-05T21:39:14Z
Modified
2024-05-20T16:03:47Z
Summary
Request smuggling due to improper header parsing in net/http
Details

HTTP headers were not properly parsed, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.

References
Credits
    • Jed Denlea
    • RĂ©gis Leroy

Affected packages

Go / stdlib

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3

Ecosystem specific

{
    "imports": [
        {
            "path": "net/http",
            "symbols": [
                "CanonicalMIMEHeaderKey",
                "body.readLocked",
                "canonicalMIMEHeaderKey",
                "chunkWriter.writeHeader",
                "fixLength",
                "fixTransferEncoding",
                "readTransfer",
                "transferWriter.shouldSendContentLength",
                "validHeaderFieldByte"
            ]
        }
    ]
}