View all vulnerabilities

CVE-2022-41721

golang.org/x/net/http2/h2c vulnerable to request smuggling attack

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.### Specific Go Packages Affectedgolang.org/x/net/http2/h2c

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Versions
golang.org/x/net >= 0.0.0-20220524220425-1d687d428aca < 0.1.1-0.20221104162952-702349b0e862
Severity
High
Ecosystem
GO
Publish Date
January 13, 2023
Modified Date
April 4, 2025