Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-30589

Опубликовано: 20 июн. 2023
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20

A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).

Отчет

The vulnerability is in the llhttp parsing not using the CRLF sequence which violates the HTTP/1.1 specification, which mandates CRLF as the delimiter. While this might result in request smuggling, the added complexity of creating a valid malformed delimited request and having it reach the intended target and then processed,which is why this has been rated as moderate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:14/nodejsWill not fix
Red Hat Software Collectionsrh-nodejs14-nodejsWill not fix
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:453608.08.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:453708.08.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportnodejsFixedRHSA-2023:536126.09.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:433031.07.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:433131.07.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportnodejsFixedRHSA-2023:553309.10.2023

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2219841nodejs: HTTP Request Smuggling via Empty headers separated by CR

EPSS

Процентиль: 83%
0.01916
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20

CVSS3: 7.5
nvd
больше 2 лет назад

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20

CVSS3: 7.5
msrc
около 1 месяца назад

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3 only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16 v18 and v20

CVSS3: 7.5
debian
больше 2 лет назад

The llhttp parser in the http module in Node v20.2.0 does not strictly ...

CVSS3: 7.5
github
больше 2 лет назад

llhttp vulnerable to HTTP request smuggling

EPSS

Процентиль: 83%
0.01916
Низкий

7 High

CVSS3