mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-22 03:18:11 +01:00
* Mark patched tiny-http version for 2020-0031 A backport of the fix for 2020-0031 has been applied to the 0.6.x branch, starting at 0.6.3, subsequent 0.6 versions are no longer vulnerable. * Fix version specification Co-authored-by: Sergey "Shnatsel" Davidoff <shnatsel@gmail.com>
23 lines
734 B
Markdown
23 lines
734 B
Markdown
```toml
|
|
[advisory]
|
|
id = "RUSTSEC-2020-0031"
|
|
package = "tiny_http"
|
|
aliases = ["CVE-2020-35884"]
|
|
date = "2020-06-16"
|
|
keywords = ["http", "request-smuggling"]
|
|
url = "https://github.com/tiny-http/tiny-http/issues/173"
|
|
|
|
[versions]
|
|
patched = [">= 0.8.0", "^0.6.3"]
|
|
```
|
|
|
|
# HTTP Request smuggling through malformed Transfer Encoding headers
|
|
|
|
HTTP pipelining issues and request smuggling attacks are possible due to incorrect
|
|
Transfer encoding header parsing.
|
|
|
|
It is possible conduct HTTP request smuggling attacks (CL:TE/TE:TE) by sending invalid Transfer Encoding headers.
|
|
|
|
By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information
|
|
from requests other than their own.
|