Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1jZ2doLXBxNDUtNmg5eM4AA0Ks

llhttp vulnerable to HTTP request smuggling

The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).

The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20

Permalink: https://github.com/advisories/GHSA-cggh-pq45-6h9x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jZ2doLXBxNDUtNmg5eM4AA0Ks
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 10 months ago
Updated: 6 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-cggh-pq45-6h9x, CVE-2023-30589
References: Repository: https://github.com/nodejs/llhttp
Blast Radius: 5.2

Affected Packages

npm:llhttp
Dependent packages: 1
Dependent repositories: 5
Downloads: 21 last month
Affected Version Ranges: < 8.1.1
Fixed in: 8.1.1
All affected versions: 1.0.1
All unaffected versions: