Описание
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.
Отчет
- This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.
- The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.
- In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Ceph Storage 2 | golang | Affected | ||
Red Hat Ceph Storage 3 | golang | Affected | ||
Red Hat Enterprise Linux 7 | gcc | Will not fix | ||
Red Hat Enterprise Linux 7 | golang | Will not fix | ||
Red Hat OpenShift Container Platform 3.10 | atomic-openshift | Out of support scope | ||
Red Hat OpenShift Container Platform 3.11 | ansible-service-broker | Will not fix | ||
Red Hat OpenShift Container Platform 3.11 | apb | Will not fix | ||
Red Hat OpenShift Container Platform 3.11 | atomic-enterprise-service-catalog | Will not fix | ||
Red Hat OpenShift Container Platform 3.11 | atomic-openshift | Will not fix | ||
Red Hat OpenShift Container Platform 3.11 | atomic-openshift-cluster-autoscaler | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smugglin ...
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
EPSS
6.5 Medium
CVSS3