CVE-2022-41721

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
Configurations

Configuration 1 (hide)

cpe:2.3:a:golang:h2c:*:*:*:*:*:go:*:*

History

07 Nov 2023, 03:52

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5DXTLLWN6HKI5I35EUZRBISTNZJ75GP/ -

27 Aug 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3H3EWQXM2XL5AGBX6UL443JEJ3GQXJN/ -

Information

Published : 2023-01-13 23:15

Updated : 2024-02-28 19:51


NVD link : CVE-2022-41721

Mitre link : CVE-2022-41721

CVE.ORG link : CVE-2022-41721


JSON object : View

Products Affected

golang

  • h2c
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')