7.5
CVSSv2

CVE-2015-5739

Published: 18/10/2017 Updated: 10/05/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The net/http library in net/textproto/reader.go in Go prior to 1.4.3 does not properly parse HTTP header keys, which allows remote malicious users to conduct HTTP request smuggling attacks via a space instead of a hyphen, as demonstrated by "Content Length" instead of "Content-Length."

Vulnerable Product Search on Vulmon Subscribe to Product

golang go

fedoraproject fedora 22

fedoraproject fedora 21

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.2

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux server eus 7.6

redhat enterprise linux server tus 7.2

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.2

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.6

redhat enterprise linux server eus 7.3

redhat enterprise linux server tus 7.3

Vendor Advisories

Debian Bug report logs - #795106 golang: CVE-2015-5739 CVE-2015-5740 CVE-2015-5741 Package: src:golang; Maintainer for src:golang is Go Compiler Team <team+go-compiler@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 10 Aug 2015 16:48:02 UTC Severity: important Tags: fixed-upstrea ...
As discussed upstream -- <a href="seclistsorg/oss-sec/2015/q3/294">here </a> and <a href="seclistsorg/oss-sec/2015/q3/237">here</a> -- the Go project received notification of an HTTP request smuggling vulnerability in the net/http library Invalid headers are parsed as valid headers (like "Content Length:" w ...
HTTP-request vulnerabilities have been found in the Golang net/http and net/textproto libraries Request headers with double Content-Length fields do not generate a 400 error (the second field is ignored), and invalid fields are parsed as valid (for example, "Content Length:" with a space in the middle is accepted) A non-authenticated attacker co ...