HTTP pipelining issues and request smuggling attacks are possible due to incorrect Transfer encoding header parsing. It is possible conduct HTTP request smuggling attacks (CL:TE/TE:TE) by sending invalid Transfer Encoding headers. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
github.com/tiny-http/tiny-http
github.com/tiny-http/tiny-http/commit/623b87397a569729c4bcabae747823c5668cce94
github.com/tiny-http/tiny-http/issues/173
github.com/tiny-http/tiny-http/pull/190
lists.fedoraproject.org/archives/list/[email protected]/message/M3JDNRE5RXJOWZZZF5QSCG4GUCSLTHF2
lists.fedoraproject.org/archives/list/[email protected]/message/VO6SRTCEPEYO2OX647I3H5XUWLFDRDWL
nvd.nist.gov/vuln/detail/CVE-2020-35884
rustsec.org/advisories/RUSTSEC-2020-0031.html