6.5 CVE-2022-32215
Exploit Patch
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
https://nvd.nist.gov/vuln/detail/CVE-2022-32215
Categories
CWE-444 : Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
The product acts as an intermediary HTTP agent(such as a proxy or firewall) in the data flow between twoentities such as a client and server, but it does notinterpret malformed HTTP requests or responses in ways thatare consistent with how the messages will be processed bythose entities that are at the ultimate destination. Use a web server that employs a strict HTTP parsing procedure, such as Apache [REF-433]. Use only SSL communication. Terminate the client session after each request. Turn all pages to non-cacheable. SSL/TLS-capable proxy allows HTTP smuggling when used in tandem with HTTP/1.0 services, due to inconsistent interpretation and input sanitization of HTTP messages within the body of another message Chain: caching proxy server has improper input validation (CWE-20) of headers, allowing HTTP response smuggling (CWE-444) using an "LF line ending" Node.js platform allows request smuggling via two Transfer-Encoding headers Web servers allow request smuggling via inconsistent HTTP headers. HTTP server allows request smuggling with both a "Transfer-Encoding: chunked" header and a Content-Length header HTTP server allows request smuggling with both a "Transfer-Encoding: chunked" header and a Content-Length header
References
CONFIRM Patch
https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf Patch Third Party Advisory |
DEBIAN
DSA-5326 Third Party Advisory |
FEDORA
FEDORA-2022-52dec6351a Mailing List Third Party Advisory |
FEDORA-2022-1667f7b60a Mailing List Third Party Advisory |
FEDORA-2022-de515f765f Mailing List Third Party Advisory |
MISC Patch Exploit
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/ Patch Vendor Advisory |
https://hackerone.com/reports/1501679 Exploit Issue Tracking Third Party Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | >= 18.0.0 | < 18.5.0 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | >= 14.15.0 | < 14.20.0 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* | >= 16.13.0 | < 16.16.0 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | >= 14.0.0 | <= 14.14.0 |
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* | >= 16.0.0 | <= 16.12.0 |
cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:* | >= 14.0.0 | < 14.20.1 |
cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:* | >= 16.0.0 | < 16.17.1 |
cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:*:*:* | >= 18.0.0 | < 18.9.1 |
Configuration 2 | ||
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | ||
Configuration 3 | ||
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:* | ||
Configuration 4 | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | ||
Configuration 5 | ||
cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:* | < 3.3.2 |
REMEDIATION
Patch
Url |
---|
https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf |
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/ |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
https://hackerone.com/reports/1501679 |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
273 | HTTP Response Smuggling |
High |
33 | HTTP Request Smuggling |
High |
MITRE
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
