// For flags

CVE-2022-32215

nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).

El parser llhttp anteriores a la versión v14.20.1, anteriores a la versión v16.17.1 y anteriores a la versión v18.9.1 del módulo http en Node.js no maneja correctamente las cabeceras Transfer-Encoding de varias líneas. Esto puede llevar al contrabando de solicitudes HTTP (HRS)

A vulnerability was found in NodeJS due to the llhttp parser in the HTTP module incorrectly handling multi-line Transfer-Encoding headers. This issue can lead to HTTP Request Smuggling (HRS). This flaw allows a remote attacker to send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers, causing web cache poisoning, and conducting XSS attacks.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-01 CVE Reserved
  • 2022-07-14 CVE Published
  • 2024-02-04 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Llhttp
Search vendor "Llhttp"
Llhttp
Search vendor "Llhttp" for product "Llhttp"
>= 14.0.0 < 14.20.1
Search vendor "Llhttp" for product "Llhttp" and version " >= 14.0.0 < 14.20.1"
node.js
Affected
Llhttp
Search vendor "Llhttp"
Llhttp
Search vendor "Llhttp" for product "Llhttp"
>= 16.0.0 < 16.17.1
Search vendor "Llhttp" for product "Llhttp" and version " >= 16.0.0 < 16.17.1"
node.js
Affected
Llhttp
Search vendor "Llhttp"
Llhttp
Search vendor "Llhttp" for product "Llhttp"
>= 18.0.0 < 18.9.1
Search vendor "Llhttp" for product "Llhttp" and version " >= 18.0.0 < 18.9.1"
-
Affected
Nodejs
Search vendor "Nodejs"
Node.js
Search vendor "Nodejs" for product "Node.js"
>= 14.0.0 <= 14.14.0
Search vendor "Nodejs" for product "Node.js" and version " >= 14.0.0 <= 14.14.0"
-
Affected
Nodejs
Search vendor "Nodejs"
Node.js
Search vendor "Nodejs" for product "Node.js"
>= 14.15.0 < 14.20.0
Search vendor "Nodejs" for product "Node.js" and version " >= 14.15.0 < 14.20.0"
lts
Affected
Nodejs
Search vendor "Nodejs"
Node.js
Search vendor "Nodejs" for product "Node.js"
>= 16.0.0 <= 16.12.0
Search vendor "Nodejs" for product "Node.js" and version " >= 16.0.0 <= 16.12.0"
-
Affected
Nodejs
Search vendor "Nodejs"
Node.js
Search vendor "Nodejs" for product "Node.js"
>= 16.13.0 < 16.16.0
Search vendor "Nodejs" for product "Node.js" and version " >= 16.13.0 < 16.16.0"
lts
Affected
Nodejs
Search vendor "Nodejs"
Node.js
Search vendor "Nodejs" for product "Node.js"
>= 18.0.0 < 18.5.0
Search vendor "Nodejs" for product "Node.js" and version " >= 18.0.0 < 18.5.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
36
Search vendor "Fedoraproject" for product "Fedora" and version "36"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
37
Search vendor "Fedoraproject" for product "Fedora" and version "37"
-
Affected
Siemens
Search vendor "Siemens"
Sinec Ins
Search vendor "Siemens" for product "Sinec Ins"
1.0
Search vendor "Siemens" for product "Sinec Ins" and version "1.0"
-
Affected
Siemens
Search vendor "Siemens"
Sinec Ins
Search vendor "Siemens" for product "Sinec Ins"
1.0
Search vendor "Siemens" for product "Sinec Ins" and version "1.0"
sp1
Affected
Siemens
Search vendor "Siemens"
Sinec Ins
Search vendor "Siemens" for product "Sinec Ins"
1.0
Search vendor "Siemens" for product "Sinec Ins" and version "1.0"
sp2
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
11.0
Search vendor "Debian" for product "Debian Linux" and version "11.0"
-
Affected
Stormshield
Search vendor "Stormshield"
Stormshield Management Center
Search vendor "Stormshield" for product "Stormshield Management Center"
< 3.3.2
Search vendor "Stormshield" for product "Stormshield Management Center" and version " < 3.3.2"
-
Affected