First published: Wed Aug 05 2015(Updated: )
Go is vulnerable to HTTP request smuggling, caused by a flaw in net/http library in net/textproto/reader.go. By sending a specially-crafted HTTP request with a space instead of a hyphen, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/golang | <1.4.3 | 1.4.3 |
redhat/golang | <1.5 | 1.5 |
Go Programming Language | <=1.4.2 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5739 is considered moderate in severity due to its potential to allow HTTP request smuggling.
To fix CVE-2015-5739, upgrade the Go programming language to version 1.5 or later.
CVE-2015-5739 affects Go versions up to and including 1.4.2.
CVE-2015-5739 allows attackers to perform HTTP request smuggling, cache poisoning, and bypass web application firewall protections.
CVE-2015-5739 affects various versions of Red Hat Enterprise Linux and Fedora.