Vulnerability Name: | CVE-2015-5741 (CCN-176323) | ||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2015-07-29 | ||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2015-07-29 | ||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-08-04 | ||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields. | ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-444 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-5741 Source: MISC Type: Mailing List, Patch, Third Party Advisory http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.html Source: MISC Type: Mailing List, Patch, Third Party Advisory http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.html Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/oss-sec/2015/q3/237 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/oss-sec/2015/q3/292 Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/oss-sec/2015/q3/294 Source: CCN Type: Red Hat Bugzilla Bug 1250352 (CVE-2015-5739, CVE-2015-5740, CVE-2015-5741) - CVE-2015-5739 CVE-2015-5740 CVE-2015-5741 golang: HTTP request smuggling in net/http library Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1250352 Source: XF Type: UNKNOWN go-cve20155741-request-smuggling(176323) Source: CCN Type: Go GIT Repository net/textproto: don't treat spaces as hyphens in header keys Source: MISC Type: Patch, Third Party Advisory https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680f | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
BACK |