Vulnerability Report: GO-2022-0212
- CVE-2019-16276
- Affects: net/textproto
- Published: May 23, 2022
- Modified: Dec 13, 2023
net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1 headers with a space before the colon, in violation of RFC 7230. If a Go server is used behind an uncommon reverse proxy that accepts and forwards but doesn't normalize such invalid headers, the reverse proxy and the server can interpret the headers differently. This can lead to filter bypasses or request smuggling, the latter if requests from separate clients are multiplexed onto the same upstream connection by the proxy. Such invalid headers are now rejected by Go servers, and passed without normalization to Go client applications.
Affected Packages
-
PathVersionsSymbols
-
before go1.12.10, from go1.13.0-0 before go1.13.1
Aliases
References
- https://go.dev/cl/197503
- https://go.googlesource.com/go/+/41b1f88efab9d263408448bf139659119002ea50
- https://go.dev/issue/34540
- https://groups.google.com/g/golang-announce/c/cszieYyuL9Q/m/g4Z7pKaqAgAJ
- https://vuln.go.dev/ID/GO-2022-0212.json
Credits
- Andrew Stucki (99designs.com)Adam Scarr (99designs.com), Jan Masarik (masarik.sh)
Feedback
See anything missing or incorrect?
Suggest an edit to this report.