CVE-2015-5741
moderate-risk
Published 2020-02-08
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
Do I need to act?
~
1.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (14)
Mailing List
http://seclists.org/oss-sec/2015/q3/237
Mailing List
http://seclists.org/oss-sec/2015/q3/292
Mailing List
http://seclists.org/oss-sec/2015/q3/294
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1250352
Mailing List
http://seclists.org/oss-sec/2015/q3/237
Mailing List
http://seclists.org/oss-sec/2015/q3/292
Mailing List
http://seclists.org/oss-sec/2015/q3/294
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1250352
47
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
5/34 · Minimal
Exposure
10/34 · Low