Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4v7x-pqxf-cx7m

Опубликовано: 04 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

net/http, x/net/http2: close connections when receiving too many headers

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Пакеты

Наименование

net/http

go
Затронутые версииВерсия исправления

< 1.21.9

1.21.9

Наименование

golang.org/x/net/http2

go
Затронутые версииВерсия исправления

< 0.23.0

0.23.0

Наименование

net/http

go
Затронутые версииВерсия исправления

>= 1.22.0-0, < 1.22.2

1.22.2

Наименование

golang.org/x/net

go
Затронутые версииВерсия исправления

< 0.23.0

0.23.0

EPSS

Процентиль: 98%
0.64852
Средний

5.3 Medium

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
nvd
около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

suse-cvrf
4 месяца назад

Security update for buildah

EPSS

Процентиль: 98%
0.64852
Средний

5.3 Medium

CVSS3

Дефекты

CWE-400