Bug 1800364 (CVE-2019-15605)
Summary: | CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jason Shepherd <jshepherd> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | bdettelb, dapospis, hhorak, igor.raits, jorton, jschorr, lkundrak, mrunge, nodejs-maint, nodejs-sig, scorneli, scorreia, sgallagh, tchollingsworth, thrcka, tomckay, vascom2, zsvetlik |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nodejs 10.19.0, nodejs 12.15.0, nodejs 13.8.0, http-parser 2.9.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the Node.js code where a specially crafted HTTP(s) request sent to a Node.js server failed to properly process the HTTP(s) headers, resulting in a request smuggling attack. An attacker can use this flaw to alter a request sent as an authenticated user if the Node.js server is deployed behind a proxy server that reuses connections.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-02-24 15:49:45 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1800371, 1800372, 1800373, 1800374, 1800375, 1800376, 1800377, 1800378, 1800379, 1800380, 1800381, 1802486, 1802487, 1802488, 1802489, 1802490, 1802501, 1803853, 1803854, 1821340 | ||
Bug Blocks: | 1800362 |
Description
Jason Shepherd
2020-02-07 00:12:24 UTC
Created nodejs tracking bugs for this issue: Affects: fedora-all [bug 1800376] Also fixed in http-parser-js 2.9.3 see: https://github.com/nodejs/http-parser/commit/7d5c99d09f6743b055d53fc3f642746d9801479b Actually the commit in the previous comment refers to the 'http-parser' c library that ships in Fedora and RHEL. Not the http-parser-js javascript library as previously mentioned. Created http-parser tracking bugs for this issue: Affects: fedora-all [bug 1802501] External References: https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/ HackerOne report (currently not public): https://hackerone.com/reports/735748 Upstream commits : * http-parser: https://github.com/nodejs/http-parser/commit/7d5c99d09f6743b055d53fc3f642746d9801479b * llhttp : https://github.com/nodejs/llhttp/commit/e19af786a172a8ba71a3d13fccc0fd4dfe4b1b94 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0573 https://access.redhat.com/errata/RHSA-2020:0573 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-15605 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:0579 https://access.redhat.com/errata/RHSA-2020:0579 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:0597 https://access.redhat.com/errata/RHSA-2020:0597 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:0598 https://access.redhat.com/errata/RHSA-2020:0598 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:0602 https://access.redhat.com/errata/RHSA-2020:0602 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:0703 https://access.redhat.com/errata/RHSA-2020:0703 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0707 https://access.redhat.com/errata/RHSA-2020:0707 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:0708 https://access.redhat.com/errata/RHSA-2020:0708 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:1510 https://access.redhat.com/errata/RHSA-2020:1510 |