First published: Tue Jul 02 2024(Updated: )
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Affected Software | Affected Version | How to fix |
---|---|---|
google net/http | ||
google httputil.ReverseProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2295310 is categorized as medium due to the impact it has on client connection stability.
To fix REDHAT-BUG-2295310, update the net/http client to the latest version where the issue has been addressed.
The potential impacts of REDHAT-BUG-2295310 include failed requests and connections remaining in an invalid state.
REDHAT-BUG-2295310 affects Google net/http and Google httputil.ReverseProxy.
REDHAT-BUG-2295310 is primarily a client-side issue affecting how the HTTP/1.1 client handles server responses.