Vulnerability Name: | CVE-2015-5740 (CCN-133656) |
Assigned: | 2015-07-29 |
Published: | 2015-07-29 |
Updated: | 2019-05-09 |
Summary: | The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers. |
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) 5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None | 6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-444
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2015-5740
Source: FEDORA Type: Third Party Advisory FEDORA-2015-15619
Source: FEDORA Type: Third Party Advisory FEDORA-2015-15618
Source: REDHAT Type: Third Party Advisory RHSA-2016:1538
Source: CCN Type: oss-sec Mailing List, Wed, 29 Jul 2015 15:15:45 +0000 CVE Request - Go net/http library - HTTP smuggling
Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20150729 CVE Request - Go net/http library - HTTP smuggling
Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20150804 CVE Request - Go net/http library - HTTP smuggling
Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20150805 Re: CVE Request - Go net/http library - HTTP smuggling
Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1250352
Source: XF Type: UNKNOWN go-cve20155740-reqeust-smuggling(133656)
Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680f
Source: CCN Type: Go Web site Go
|
Vulnerable Configuration: | Configuration 1: cpe:/a:golang:go:*:*:*:*:*:*:*:* (Version <= 1.4.2) Configuration 2: cpe:/o:fedoraproject:fedora:21:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:22:*:*:*:*:*:*:* Configuration 3: cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
golang go *
fedoraproject fedora 21
fedoraproject fedora 22
redhat enterprise linux server 7.0
redhat enterprise linux server aus 7.2
redhat enterprise linux server aus 7.3
redhat enterprise linux server aus 7.4
redhat enterprise linux server aus 7.6
redhat enterprise linux server eus 7.2
redhat enterprise linux server eus 7.3
redhat enterprise linux server eus 7.4
redhat enterprise linux server eus 7.5
redhat enterprise linux server eus 7.6
redhat enterprise linux server tus 7.2
redhat enterprise linux server tus 7.3
redhat enterprise linux server tus 7.6