Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h385-52j6-9984

Опубликовано: 20 окт. 2020
Источник: github
Github: Прошло ревью

Описание

Withdrawn: HTTP Request Smuggling in Agoo

Withdrawn reason

Withdrawn on 1/13/2021 due to this comment from the maintainer. This is no longer considered a vulnerability.

Original description

agoo through 2.12.3 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.

Пакеты

Наименование

agoo

rubygems
Затронутые версииВерсия исправления

<= 2.13.0

Отсутствует

EPSS

Процентиль: 52%
0.00289
Низкий

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks where `agoo` is used as part of a chain of backend servers due to insufficient `Content-Length` and `Transfer Encoding` parsing.

EPSS

Процентиль: 52%
0.00289
Низкий

Дефекты

CWE-444