Vulnerability Name:

CVE-2022-1705 (CCN-233258)

Assigned:2022-06-01
Published:2022-06-01
Updated:2023-03-03
Summary:Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.5 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-444
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2022-1705

Source: XF
Type: UNKNOWN
golang-cve20221705-request-smuggling(233258)

Source: CCN
Type: Go GIT Repository
net/http: improper sanitization of Transfer-Encoding header #53188

Source: security@golang.org
Type: Patch, Vendor Advisory
security@golang.org

Source: security@golang.org
Type: Patch, Vendor Advisory
security@golang.org

Source: security@golang.org
Type: Exploit, Issue Tracking, Patch, Vendor Advisory
security@golang.org

Source: security@golang.org
Type: Patch, Vendor Advisory
security@golang.org

Source: security@golang.org
Type: Release Notes, Vendor Advisory
security@golang.org

Source: security@golang.org
Type: Vendor Advisory
security@golang.org

Source: CCN
Type: IBM Security Bulletin 6621115 (Spectrum Protect Server)
Vulnerabilities in IBM Db2, Golang Go, and Logback may affect the IBM Spectrum Protect Server (CVE-2022-30631, CVE-2022-30633, CVE-2022-1705, CVE-2022-22389, CVE-2022-22390, CVE-2021-42550, CVE-2022-30629)

Source: CCN
Type: IBM Security Bulletin 6695785 (Cloud Pak for Integration)
Operations Dashboard is vulnerable to request smuggling due to Golang Go vulnerability CVE-2022-1705

Source: CCN
Type: IBM Security Bulletin 6824759 (MQ Operator)
IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from curl, systemd, and Golang Go

Source: CCN
Type: IBM Security Bulletin 6825557 (Event Streams)
Multiple vulnerabilities in Golang Go affect IBM Event Streams

Source: CCN
Type: IBM Security Bulletin 6827815 (Cloud Pak for Integration)
Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple Go vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6831591 (Robotic Process Automation)
Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak

Source: CCN
Type: IBM Security Bulletin 6837281 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container operator and IntegrationServer operands may be vulnerable to HTTP request smuggling due to CVE-2022-1705

Source: CCN
Type: IBM Security Bulletin 6838883 (Spectrum Protect Plus)
Vulnerabilities in Golang Go affect IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift

Source: CCN
Type: IBM Security Bulletin 6845942 (Spectrum Copy Data Management)
Vulnerabilities in Golang Go and Linux Kernel may affect IBM Spectrum Copy Data Management

Source: CCN
Type: IBM Security Bulletin 6855105 (Watson Discovery)
IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Go

Source: CCN
Type: IBM Security Bulletin 6909423 (Cloud Pak for Multicloud Management Monitoring)
IBM Cloud Pak for Multicloud Management Monitoring has applied security fixes for its use of Golang Go

Source: CCN
Type: IBM Security Bulletin 6956311 (Cloud Pak for Multicloud Management)
Multiple Vulnerabilities in Multicloud Management Security Services

Source: CCN
Type: IBM Security Bulletin 6958068 (CICS TX Standard)
Multiple vulnerabilities in Go may affect IBM CICS TX Standard

Source: CCN
Type: IBM Security Bulletin 6966308 (Cloud Pak System Software Suite)
Multiple vulnerabilities in Golang affect IBM Cloud Pak System

Source: CCN
Type: IBM Security Bulletin 6966998 (WebSphere Automation)
Multiple vulnerabilities in the mongo-tools utility affect IBM WebSphere Automation

Source: CCN
Type: IBM Security Bulletin 7005589 (Spectrum Protect Plus)
Vulnerabilities in Apache Commons, Tomcat, Go, libcurl, OpenSSL, Python, Node.js, and Linux can affect IBM Spectrum Protect Plus.

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:golang:go:1.17.11:*:*:*:*:*:*:*
  • OR cpe:/a:golang:go:1.18.3:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_plus:10.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:event_streams:10.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cics_tx:11.1:*:*:*:standard:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation:21.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.0:*:*:*:lts:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20228098
    P
    RHSA-2022:8098: toolbox security and bug fix update (Moderate)
    2022-11-15
    oval:com.redhat.rhsa:def:20228250
    P
    RHSA-2022:8250: grafana-pcp security update (Moderate)
    2022-11-15
    oval:com.redhat.rhsa:def:20228057
    P
    RHSA-2022:8057: grafana security, bug fix, and enhancement update (Important)
    2022-11-15
    oval:com.redhat.rhsa:def:20227519
    P
    RHSA-2022:7519: grafana security, bug fix, and enhancement update (Moderate)
    2022-11-08
    oval:com.redhat.rhsa:def:20227529
    P
    RHSA-2022:7529: container-tools:3.0 security update (Moderate)
    2022-11-08
    oval:com.redhat.rhsa:def:20227648
    P
    RHSA-2022:7648: grafana-pcp security update (Moderate)
    2022-11-08
    oval:com.redhat.rhsa:def:20227129
    P
    RHSA-2022:7129: git-lfs security and bug fix update (Moderate)
    2022-10-25
    oval:org.opensuse.security:def:118980
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:676
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:95341
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:119285
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:677
    P
    Security update for go1.18 (Important)
    2022-08-04
    oval:org.opensuse.security:def:95342
    P
    Security update for go1.18 (Important)
    2022-08-04
    oval:org.opensuse.security:def:119466
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:3711
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:118790
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:119651
    P
    Security update for go1.17 (Important)
    2022-08-04
    oval:org.opensuse.security:def:3712
    P
    Security update for go1.18 (Important)
    2022-08-04
    oval:com.redhat.rhsa:def:20225775
    P
    RHSA-2022:5775: go-toolset:rhel8 security and bug fix update (Important)
    2022-08-01
    oval:com.redhat.rhsa:def:20225799
    P
    RHSA-2022:5799: go-toolset and golang security and bug fix update (Important)
    2022-08-01
    BACK
    golang go 1.17.11
    golang go 1.18.3
    ibm spectrum protect plus 10.1.0
    ibm spectrum protect plus 10.1.5
    ibm event streams 10.0.0
    ibm event streams 10.1.0
    ibm spectrum protect plus 10.1.7
    ibm event streams 10.2.0
    ibm event streams 10.3.0
    ibm event streams 10.3.1
    ibm robotic process automation 21.0.1
    ibm robotic process automation 21.0.2
    ibm app connect enterprise certified container 4.1
    ibm cics tx 11.1
    ibm app connect enterprise certified container 4.2
    ibm robotic process automation 21.0.3
    ibm robotic process automation 21.0.4
    ibm app connect enterprise certified container 5.0
    ibm app connect enterprise certified container 5.1
    ibm app connect enterprise certified container 5.2