6.5 CVE-2022-32215

Exploit Patch
 

The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
https://nvd.nist.gov/vuln/detail/CVE-2022-32215

Categories

CWE-444 : Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
The product acts as an intermediary HTTP agent(such as a proxy or firewall) in the data flow between twoentities such as a client and server, but it does notinterpret malformed HTTP requests or responses in ways thatare consistent with how the messages will be processed bythose entities that are at the ultimate destination. Use a web server that employs a strict HTTP parsing procedure, such as Apache [REF-433]. Use only SSL communication. Terminate the client session after each request. Turn all pages to non-cacheable. SSL/TLS-capable proxy allows HTTP smuggling when used in tandem with HTTP/1.0 services, due to inconsistent interpretation and input sanitization of HTTP messages within the body of another message Chain: caching proxy server has improper input validation (CWE-20) of headers, allowing HTTP response smuggling (CWE-444) using an "LF line ending" Node.js platform allows request smuggling via two Transfer-Encoding headers Web servers allow request smuggling via inconsistent HTTP headers. HTTP server allows request smuggling with both a "Transfer-Encoding: chunked" header and a Content-Length header HTTP server allows request smuggling with both a "Transfer-Encoding: chunked" header and a Content-Length header

References

CONFIRM Patch

DEBIAN

DSA-5326
Third Party Advisory

FEDORA

FEDORA-2022-52dec6351a
Mailing List Third Party Advisory
FEDORA-2022-1667f7b60a
Mailing List Third Party Advisory
FEDORA-2022-de515f765f
Mailing List Third Party Advisory

MISC Patch Exploit


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* >= 18.0.0 < 18.5.0
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* >= 14.15.0 < 14.20.0
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* >= 16.13.0 < 16.16.0
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* >= 14.0.0 <= 14.14.0
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* >= 16.0.0 <= 16.12.0
cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:* >= 14.0.0 < 14.20.1
cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:node.js:*:* >= 16.0.0 < 16.17.1
cpe:2.3:a:llhttp:llhttp:*:*:*:*:*:*:*:* >= 18.0.0 < 18.9.1
Configuration 2
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
Configuration 3
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
Configuration 4
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Configuration 5
cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:* < 3.3.2


REMEDIATION


Patch

Url
https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/


EXPLOITS


Exploit-db.com

id description date
No known exploits

Other (github, ...)

Url
https://hackerone.com/reports/1501679


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
273 HTTP Response Smuggling
High
33 HTTP Request Smuggling
High


MITRE