mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-22 19:35:23 +01:00
24 lines
811 B
Markdown
24 lines
811 B
Markdown
```toml
|
|
[advisory]
|
|
id = "RUSTSEC-2020-0031"
|
|
package = "tiny_http"
|
|
aliases = ["CVE-2020-35884", "GHSA-7v2r-wxmg-mgvc"]
|
|
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
|
|
date = "2020-06-16"
|
|
keywords = ["http", "request-smuggling"]
|
|
url = "https://github.com/tiny-http/tiny-http/issues/173"
|
|
|
|
[versions]
|
|
patched = [">= 0.8.0", "^0.6.3"]
|
|
```
|
|
|
|
# HTTP Request smuggling through malformed Transfer Encoding headers
|
|
|
|
HTTP pipelining issues and request smuggling attacks are possible due to incorrect
|
|
Transfer encoding header parsing.
|
|
|
|
It is possible conduct HTTP request smuggling attacks (CL:TE/TE:TE) by sending invalid Transfer Encoding headers.
|
|
|
|
By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information
|
|
from requests other than their own.
|