View all vulnerabilities

CVE-2022-41721

Request smuggling due to improper request handling in golang.org/x/net/http2/h2c

A request smuggling attack is possible when using MaxBytesHandler.When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
Score Vector
Affected Versions
golang.org/x/net >= 0.0.0-20220524220425-1d687d428aca < 0.1.1-0.20221104162952-702349b0e862
Severity
Ecosystem
GO
Publish Date
January 13, 2023
Modified Date
May 20, 2024