Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: Potential Vulnerability in HTTP Parser Implementation #4297

Open
wants to merge 4 commits into
base: develop
Choose a base branch
from

Conversation

yannaingtun
Copy link

Description
This PR fixes a security vulnerability in http_parser_execute() that was cloned from node but did not receive the security patch. The original issue was reported and fixed under nodejs/node@fc70ce0. This PR applies the same patch to eliminate the vulnerability.

References

This patch addresses an HTTP request smuggling vulnerability by:
1. Adding allow_chunked_length parameter
2. Properly handling multiple Transfer-Encoding headers
3. Implementing RFC 7230 Section 3.3.3 checks for Transfer-Encoding and Content-Length conflicts

Based on fix: nodejs/node@fc70ce0
@winlinvip winlinvip added the EnglishNative This issue is conveyed exclusively in English. label Feb 27, 2025
@duiniuluantanqin
Copy link
Member

duiniuluantanqin commented Feb 28, 2025

Please resolve the errors in the pipeline first.

TRANS_BY_GPT4

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
EnglishNative This issue is conveyed exclusively in English.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants