Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-16276

Опубликовано: 25 сент. 2019
Источник: redhat
CVSS3: 6.5
EPSS Средний

Описание

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.

It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.

Отчет

  • This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.
  • The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.
  • In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2golangAffected
Red Hat Ceph Storage 3golangAffected
Red Hat Enterprise Linux 7gccWill not fix
Red Hat Enterprise Linux 7golangWill not fix
Red Hat OpenShift Container Platform 3.10atomic-openshiftOut of support scope
Red Hat OpenShift Container Platform 3.11ansible-service-brokerWill not fix
Red Hat OpenShift Container Platform 3.11apbWill not fix
Red Hat OpenShift Container Platform 3.11atomic-enterprise-service-catalogWill not fix
Red Hat OpenShift Container Platform 3.11atomic-openshiftWill not fix
Red Hat OpenShift Container Platform 3.11atomic-openshift-cluster-autoscalerWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1755969golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling

EPSS

Процентиль: 94%
0.15237
Средний

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.

CVSS3: 7.5
nvd
больше 5 лет назад

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
больше 5 лет назад

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smugglin ...

github
около 3 лет назад

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.

EPSS

Процентиль: 94%
0.15237
Средний

6.5 Medium

CVSS3

Уязвимость CVE-2019-16276