logo

CVE-2022-32214 llhttp

Package

Manager: npm
Name: llhttp
Vulnerable Version: >=0 <6.0.7

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.64855 pctl0.98412

Details

llhttp allows HTTP Request Smuggling via Improper Delimiting of Header Fields The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. The LF character (without CR) is sufficient to delimit HTTP header fields in the lihttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This can lead to HTTP Request Smuggling (HRS).

Metadata

Created: 2022-07-15T00:00:18Z
Modified: 2023-07-11T00:18:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-q5vx-44v4-gch4/GHSA-q5vx-44v4-gch4.json
CWE IDs: ["CWE-444"]
Alternative ID: GHSA-q5vx-44v4-gch4
Finding: F110
Auto approve: 1