Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-2708

Опубликовано: 18 фев. 2026
Источник: redhat
CVSS3: 3.7

Описание

A request smuggling vulnerability exists in libsoup's HTTP/1 header parsing logic. The soup_message_headers_append_common() function in libsoup/soup-message-headers.c unconditionally appends each header value without validating for duplicate or conflicting Content-Length fields. This allows an attacker to send HTTP requests containing multiple Content-Length headers with differing values.

Отчет

The practical impact is limited because SoupServer is a testing and development utility, not designed for production internet infrastructure. Exploitation requires a deployment topology where SoupServer is serving real traffic behind (or in front of) another HTTP server acting as a proxy — a scenario that contradicts its intended use.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsoup3Under investigation
Red Hat Enterprise Linux 6libsoupFix deferred
Red Hat Enterprise Linux 7libsoupFix deferred
Red Hat Enterprise Linux 8libsoupUnder investigation
Red Hat Enterprise Linux 9libsoupUnder investigation

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2440743libsoup: libsoup: HTTP Request Smuggling via Duplicate Content-Length Headers

3.7 Low

CVSS3

Связанные уязвимости

ubuntu
около 1 месяца назад

[libsoup: HTTP/1 request smuggling primitives accepted (CL.CL and TE+CL) in soup_headers_parse()]

debian

[libsoup: HTTP/1 request smuggling primitives accepted (CL.CL and TE+CL) in soup_headers_parse()]

suse-cvrf
29 дней назад

Security update for libsoup

suse-cvrf
29 дней назад

Security update for libsoup

suse-cvrf
30 дней назад

Security update for libsoup2

3.7 Low

CVSS3