mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-23 20:05:15 +01:00
23 lines
724 B
Markdown
23 lines
724 B
Markdown
```toml
|
|
[advisory]
|
|
id = "RUSTSEC-2020-0031"
|
|
package = "tiny_http"
|
|
aliases = ["CVE-2020-35884"]
|
|
date = "2020-06-16"
|
|
keywords = ["http", "request-smuggling"]
|
|
url = "https://github.com/tiny-http/tiny-http/issues/173"
|
|
|
|
[versions]
|
|
patched = [">= 0.8.0"]
|
|
```
|
|
|
|
# HTTP Request smuggling through malformed Transfer Encoding headers
|
|
|
|
HTTP pipelining issues and request smuggling attacks are possible due to incorrect
|
|
Transfer encoding header parsing.
|
|
|
|
It is possible conduct HTTP request smuggling attacks (CL:TE/TE:TE) by sending invalid Transfer Encoding headers.
|
|
|
|
By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information
|
|
from requests other than their own.
|