First published: Sat Feb 08 2020(Updated: )
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.4.3 | |
Redhat Openstack | =7.0 | |
Redhat Openstack | =8 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5741 is a vulnerability in the net/http library in Go before 1.4.3 that allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
CVE-2015-5741 affects Golang Go versions up to and excluding 1.4.3, allowing remote attackers to conduct HTTP request smuggling attacks.
CVE-2015-5741 affects Redhat Openstack versions 7.0 and 8, allowing remote attackers to conduct HTTP request smuggling attacks.
CVE-2015-5741 affects Redhat Enterprise Linux version 7.0, allowing remote attackers to conduct HTTP request smuggling attacks.
CVE-2015-5741 has a severity rating of 9.8 (Critical).
To fix CVE-2015-5741, update Golang Go to version 1.4.3 or higher, Redhat Openstack to the latest version, or Redhat Enterprise Linux to a version that includes the fix.