Bug 2364235 (CVE-2025-47905) - CVE-2025-47905 varnish: request smuggling attacks
Summary: CVE-2025-47905 varnish: request smuggling attacks
Keywords:
Status: NEW
Alias: CVE-2025-47905
Deadline: 2025-05-12
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-05 20:54 UTC by OSIDB Bzimport
Modified: 2025-05-19 15:36 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-05 20:54:13 UTC
This vulnerability may allow for request smuggling attacks, potentially resulting in an unspecified system caching incorrect content. 

The bug is an error in how to parse a chunked message body. The RFC tells to use only CRLF sequence to end a line: https://www.rfc-editor.org/rfc/rfc9112.html#name-chunked-transfer-coding
However, Varnish has up until now mistakenly treated white-spaces as line ending as well. This allows a client to construct a HTTP/1 request to smuggle another malicious request in the body of the first request. When this is used against an endpoint that is blindly forwarding HTTP requests, it can lead to ways for this client to abuse this behavior of Varnish.


Note You need to log in before you can comment on or make changes to this bug.