Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-39326

Опубликовано: 06 дек. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).

Меры по смягчению последствий

No mitigation is available for this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-waiters-rhel8Affected
cert-manager Operator for Red Hat OpenShiftcert-manager/cert-manager-operator-rhel9Not affected
Cost Management Metrics Operatorcostmanagement-metrics-operator-containerAffected
Fence Agents Remediation Operatorworkload-availability/fence-agents-remediation-rhel8-operatorAffected
Logical Volume Manager Storagelvms4/topolvm-rhel9Affected
Machine Deletion Remediation Operatorworkload-availability/machine-deletion-remediation-rhel8-operatorAffected
Migration Toolkit for Applications 6mta/mta-hub-rhel9Will not fix
Migration Toolkit for Containersrhmtc/openshift-migration-registry-rhel8Affected
NBDE Tang Servertang-operator-containerWill not fix
Node HealthCheck Operatorworkload-availability/node-healthcheck-rhel8-operatorAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2253330golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests

EPSS

Процентиль: 31%
0.00123
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
nvd
больше 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
msrc
7 месяцев назад

Denial of service via chunk extensions in net/http

CVSS3: 5.3
debian
больше 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
github
больше 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

EPSS

Процентиль: 31%
0.00123
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2023-39326