Описание
HTTP Request smuggling in tiny_http
HTTP pipelining issues and request smuggling attacks are possible due to incorrect Transfer encoding header parsing. It is possible conduct HTTP request smuggling attacks (CL:TE/TE:TE) by sending invalid Transfer Encoding headers. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-35884
- https://github.com/tiny-http/tiny-http/issues/173
- https://github.com/tiny-http/tiny-http/pull/190
- https://github.com/tiny-http/tiny-http/commit/623b87397a569729c4bcabae747823c5668cce94
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3JDNRE5RXJOWZZZF5QSCG4GUCSLTHF2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VO6SRTCEPEYO2OX647I3H5XUWLFDRDWL
- https://rustsec.org/advisories/RUSTSEC-2020-0031.html
Пакеты
Наименование
tiny_http
rust
Затронутые версииВерсия исправления
< 0.8.0
0.8.0
Связанные уязвимости
CVSS3: 6.5
nvd
около 5 лет назад
An issue was discovered in the tiny_http crate through 2020-06-16 for Rust. HTTP Request smuggling can occur via a malformed Transfer-Encoding header.