Skip to content

Commit e501018

Browse files
tatianabTatiana Bradley
authored and
Tatiana Bradley
committed
data/reports: add GO-2023-1495.yaml
Aliases: CVE-2022-41721 Updates #1495 Change-Id: I4a95c86b2b1815e8b774d00e810c3d110771456f Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/462082 Reviewed-by: Damien Neil <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]> Reviewed-by: John Howard <[email protected]>
1 parent d5094c8 commit e501018

File tree

3 files changed

+158
-0
lines changed

3 files changed

+158
-0
lines changed

data/cve/v5/GO-2023-1495.json

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2022-41721"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"descriptions": [
13+
{
14+
"lang": "en",
15+
"value": "A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests."
16+
}
17+
],
18+
"affected": [
19+
{
20+
"vendor": "golang.org/x/net",
21+
"product": "golang.org/x/net/http2/h2c",
22+
"collectionURL": "https://pkg.go.dev",
23+
"packageName": "golang.org/x/net/http2/h2c",
24+
"versions": [
25+
{
26+
"version": "0.0.0-20220524220425-1d687d428aca",
27+
"lessThan": "0.1.1-0.20221104162952-702349b0e862",
28+
"status": "affected",
29+
"versionType": "semver"
30+
}
31+
],
32+
"programRoutines": [
33+
{
34+
"name": "h2cHandler.ServeHTTP"
35+
},
36+
{
37+
"name": "h2cUpgrade"
38+
}
39+
],
40+
"defaultStatus": "unaffected"
41+
}
42+
],
43+
"problemTypes": [
44+
{
45+
"descriptions": [
46+
{
47+
"lang": "en",
48+
"description": "CWE 444: Inconsistent Interpretation of HTTP Requests (\"HTTP Request/Response Smuggling)"
49+
}
50+
]
51+
}
52+
],
53+
"references": [
54+
{
55+
"url": "https://go.dev/issue/56352"
56+
},
57+
{
58+
"url": "https://go.dev/cl/447396"
59+
},
60+
{
61+
"url": "https://pkg.go.dev/vuln/GO-2023-1495"
62+
}
63+
],
64+
"credits": [
65+
{
66+
"lang": "en",
67+
"value": "John Howard (Google)"
68+
}
69+
]
70+
}
71+
}
72+
}

data/osv/GO-2023-1495.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "GO-2023-1495",
3+
"published": "0001-01-01T00:00:00Z",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"aliases": [
6+
"CVE-2022-41721"
7+
],
8+
"details": "A request smuggling attack is possible when using MaxBytesHandler.\n\nWhen using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.",
9+
"affected": [
10+
{
11+
"package": {
12+
"name": "golang.org/x/net",
13+
"ecosystem": "Go"
14+
},
15+
"ranges": [
16+
{
17+
"type": "SEMVER",
18+
"events": [
19+
{
20+
"introduced": "0.0.0-20220524220425-1d687d428aca"
21+
},
22+
{
23+
"fixed": "0.1.1-0.20221104162952-702349b0e862"
24+
}
25+
]
26+
}
27+
],
28+
"database_specific": {
29+
"url": "https://pkg.go.dev/vuln/GO-2023-1495"
30+
},
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "golang.org/x/net/http2/h2c",
35+
"symbols": [
36+
"h2cHandler.ServeHTTP",
37+
"h2cUpgrade"
38+
]
39+
}
40+
]
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "REPORT",
47+
"url": "https://go.dev/issue/56352"
48+
},
49+
{
50+
"type": "FIX",
51+
"url": "https://go.dev/cl/447396"
52+
}
53+
],
54+
"credits": [
55+
{
56+
"name": "John Howard (Google)"
57+
}
58+
],
59+
"schema_version": "1.3.1"
60+
}

data/reports/GO-2023-1495.yaml

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
modules:
2+
- module: golang.org/x/net
3+
versions:
4+
- introduced: 0.0.0-20220524220425-1d687d428aca
5+
fixed: 0.1.1-0.20221104162952-702349b0e862
6+
vulnerable_at: 0.1.1-0.20221104145632-7a676822c292
7+
packages:
8+
- package: golang.org/x/net/http2/h2c
9+
symbols:
10+
- h2cHandler.ServeHTTP
11+
- h2cUpgrade
12+
description: |
13+
A request smuggling attack is possible when using MaxBytesHandler.
14+
15+
When using MaxBytesHandler, the body of an HTTP request is not fully
16+
consumed. When the server attempts to read HTTP2 frames from the
17+
connection, it will instead be reading the body of the HTTP request,
18+
which could be attacker-manipulated to represent arbitrary HTTP2 requests.
19+
credit: John Howard (Google)
20+
references:
21+
- report: https://go.dev/issue/56352
22+
- fix: https://go.dev/cl/447396
23+
cve_metadata:
24+
id: CVE-2022-41721
25+
cwe: 'CWE 444: Inconsistent Interpretation of HTTP Requests ("HTTP Request/Response
26+
Smuggling)'

0 commit comments

Comments
 (0)