Bug 2007577 (CVE-2021-32715) - CVE-2021-32715 rust-hyper: Lenient Parsing of Content-Length Header When Prefixed with Plus Sign
Summary: CVE-2021-32715 rust-hyper: Lenient Parsing of Content-Length Header When Pref...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2021-32715
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2007578
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-09-24 09:59 UTC by Dhananjay Arunesh
Modified: 2021-09-24 12:21 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-09-24 12:21:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2021-09-24 09:59:28 UTC
hyper is an HTTP library for rust. hyper's HTTP/1 server code had a flaw that
incorrectly parses and accepts requests with a `Content-Length` header with a
prefixed plus sign, when it should have been rejected as illegal. This combined
with an upstream HTTP proxy that doesn't parse such `Content-Length` headers,
but forwards them, can result in "request smuggling" or "desync attacks". The
flaw exists in all prior versions of hyper prior to 0.14.10, if built with
`rustc` v1.5.0 or newer. The vulnerability is patched in hyper version 0.14.10.
Two workarounds exist: One may reject requests manually that contain a plus sign
prefix in the `Content-Length` header or ensure any upstream proxy handles
`Content-Length` headers with a plus sign prefix.

References:
https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739
https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c

Comment 1 Dhananjay Arunesh 2021-09-24 09:59:55 UTC
Created rust-hyper tracking bugs for this issue:

Affects: fedora-34 [bug 2007578]

Comment 2 Product Security DevOps Team 2021-09-24 12:21:10 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.