CVE-2021-32715HTTP Request Smuggling in Hyper

Severity
5.3MEDIUMNVD
EPSS
0.3%
top 47.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 7
Latest updateSep 23

Description

hyper is an HTTP library for rust. hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in "request smuggling" or "desync attacks". The flaw exists in all prior versions of hyper prior to 0.14.10, if built with `rustc` v1.5.0 or newer. The vuln

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages9 packages

debiandebian/rust-hyper< rust-hyper 0.14.19-1 (bookworm)
NVDhyper/hyper< 0.14.10
crates.iohyper/hyper0.0.0-00.14.10+1
CVEListV5hyperium/hyper< 0.14.10

Patches

🔴Vulnerability Details

4
OSV
Lenient Parsing of Content-Length Header When Prefixed with Plus Sign2021-07-12
GHSA
Lenient Parsing of Content-Length Header When Prefixed with Plus Sign2021-07-12
OSV
Lenient `hyper` header parsing of `Content-Length` could allow request smuggling2021-07-07
OSV
CVE-2021-32715: hyper is an HTTP library for rust2021-07-07

📋Vendor Advisories

2
Microsoft
Lenient Parsing of Content-Length Header When Prefixed with Plus Sign2021-07-13
Debian
CVE-2021-32715: rust-hyper - hyper is an HTTP library for rust. hyper's HTTP/1 server code had a flaw that in...2021

📄Research Papers

1
arXiv
Security Review of Ethereum Beacon Clients2021-09-23
CVE-2021-32715 — HTTP Request Smuggling in Hyper | cvebase