Inconsistent interpretation of HTTP requests in HTTP-Daemon - CVE-2022-31081
Published: July 14, 2022
HTTP-Daemon
OALDERS
Description
The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
Remediation
External links
- https://github.com/libwww-perl/HTTP-Daemon/commit/e84475de51d6fd7b29354a997413472a99db70b2
- https://github.com/libwww-perl/HTTP-Daemon/commit/8dc5269d59e2d5d9eb1647d82c449ccd880f7fd0
- https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
- https://datatracker.ietf.org/doc/html/rfc7230#section-9.5
- https://github.com/libwww-perl/HTTP-Daemon/security/advisories/GHSA-cg8c-pxmv-w7cf
- http://metacpan.org/release/HTTP-Daemon/
- https://cwe.mitre.org/data/definitions/444.html