Lucene search

K
rubygemsRubySecRUBY:GOLIATH-2020-7671
HistoryMay 23, 2021 - 9:00 p.m.

HTTP Request Smuggling in goliath

2021-05-2321:00:00
RubySec
github.com
7
goliath
request smuggling
http
proxy
content-length
transfer encoding
attacks

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

goliath through 1.0.6 allows request smuggling attacks where goliath
is used as a backend and a frontend proxy also being vulnerable. It is possible
to conduct HTTP request smuggling attacks by sending the Content-Length header twice.
Furthermore, invalid Transfer Encoding headers were found to be parsed as valid
which could be leveraged for TE:CL smuggling attacks.

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Related for RUBY:GOLIATH-2020-7671