Bug 2364235 (CVE-2025-47905) - CVE-2025-47905 varnish: request smuggling attacks
Summary: CVE-2025-47905 varnish: request smuggling attacks
Keywords:
Status: NEW
Alias: CVE-2025-47905
Deadline: 2025-05-12
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2369404
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-05 20:54 UTC by OSIDB Bzimport
Modified: 2025-06-10 09:50 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:8294 0 None None None 2025-05-29 08:45:09 UTC
Red Hat Product Errata RHSA-2025:8310 0 None None None 2025-05-29 12:33:30 UTC
Red Hat Product Errata RHSA-2025:8336 0 None None None 2025-06-02 03:17:35 UTC
Red Hat Product Errata RHSA-2025:8337 0 None None None 2025-06-02 02:13:20 UTC
Red Hat Product Errata RHSA-2025:8339 0 None None None 2025-06-02 01:53:23 UTC
Red Hat Product Errata RHSA-2025:8340 0 None None None 2025-06-02 02:11:49 UTC
Red Hat Product Errata RHSA-2025:8349 0 None None None 2025-06-02 03:09:22 UTC
Red Hat Product Errata RHSA-2025:8350 0 None None None 2025-06-02 03:03:07 UTC
Red Hat Product Errata RHSA-2025:8351 0 None None None 2025-06-02 03:14:12 UTC
Red Hat Product Errata RHSA-2025:8550 0 None None None 2025-06-04 22:24:40 UTC

Description OSIDB Bzimport 2025-05-05 20:54:13 UTC
This vulnerability may allow for request smuggling attacks, potentially resulting in an unspecified system caching incorrect content. 

The bug is an error in how to parse a chunked message body. The RFC tells to use only CRLF sequence to end a line: https://www.rfc-editor.org/rfc/rfc9112.html#name-chunked-transfer-coding
However, Varnish has up until now mistakenly treated white-spaces as line ending as well. This allows a client to construct a HTTP/1 request to smuggle another malicious request in the body of the first request. When this is used against an endpoint that is blindly forwarding HTTP requests, it can lead to ways for this client to abuse this behavior of Varnish.

Comment 2 errata-xmlrpc 2025-05-29 08:45:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:8294 https://access.redhat.com/errata/RHSA-2025:8294

Comment 3 errata-xmlrpc 2025-05-29 12:33:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:8310 https://access.redhat.com/errata/RHSA-2025:8310

Comment 4 errata-xmlrpc 2025-06-02 01:53:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:8339 https://access.redhat.com/errata/RHSA-2025:8339

Comment 5 errata-xmlrpc 2025-06-02 02:11:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2025:8340 https://access.redhat.com/errata/RHSA-2025:8340

Comment 6 errata-xmlrpc 2025-06-02 02:13:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:8337 https://access.redhat.com/errata/RHSA-2025:8337

Comment 7 errata-xmlrpc 2025-06-02 03:03:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:8350 https://access.redhat.com/errata/RHSA-2025:8350

Comment 8 errata-xmlrpc 2025-06-02 03:09:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:8349 https://access.redhat.com/errata/RHSA-2025:8349

Comment 9 errata-xmlrpc 2025-06-02 03:14:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:8351 https://access.redhat.com/errata/RHSA-2025:8351

Comment 10 errata-xmlrpc 2025-06-02 03:17:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:8336 https://access.redhat.com/errata/RHSA-2025:8336

Comment 12 errata-xmlrpc 2025-06-04 22:24:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:8550 https://access.redhat.com/errata/RHSA-2025:8550


Note You need to log in before you can comment on or make changes to this bug.