Описание
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.6 (включая)
cpe:2.3:a:goliath_project:goliath:*:*:*:*:*:ruby:*:*
EPSS
Процентиль: 47%
0.00242
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-444
Связанные уязвимости
EPSS
Процентиль: 47%
0.00242
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-444