Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. golang.org/x/net/http2/h2c
  4. ›
  5. CVE-2022-41721

CVE-2022-41721: golang.org/x/net/http2/h2c vulnerable to request smuggling attack

January 14, 2023 (updated January 20, 2023)

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

References

  • github.com/advisories/GHSA-fxg5-wq6x-vr4w
  • go.dev/cl/447396
  • go.dev/issue/56352
  • nvd.nist.gov/vuln/detail/CVE-2022-41721
  • pkg.go.dev/vuln/GO-2023-1495

Code Behaviors & Features

Detect and mitigate CVE-2022-41721 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.0.0-20220524220425-1d687d428aca before 0.1.1-0.20221104162952-702349b0e862

Fixed versions

  • 0.1.1-0.20221104162952-702349b0e862

Solution

Upgrade to version 0.1.1-0.20221104162952-702349b0e862 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Source file

go/golang.org/x/net/http2/h2c/CVE-2022-41721.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:21 +0000.