Go Standard Library Net Http vulnerabilities

15 known vulnerabilities affecting go_standard_library/net_http.

Total CVEs
15
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM10

Vulnerabilities

Page 1 of 1
CVE-2025-58186MEDIUMCVSS 5.3fixed in 1.24.8≥ 1.25.0, < 1.25.22025-10-29
CVE-2025-58186 [MEDIUM] CVE-2025-58186: Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does no Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
cvelistv5nvd
CVE-2025-47910MEDIUMCVSS 5.4≥ 1.25.0, < 1.25.12025-09-22
CVE-2025-47910 [MEDIUM] CVE-2025-47910: When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass m When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.
cvelistv5nvd
CVE-2025-4673MEDIUMCVSS 6.8fixed in 1.23.10≥ 1.24.0-0, < 1.24.42025-06-11
CVE-2025-4673 [MEDIUM] CVE-2025-4673: Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially l Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.
cvelistv5nvd
CVE-2025-22870MEDIUMCVSS 4.4fixed in 1.23.7≥ 1.24.0-0, < 1.24.12025-03-12
CVE-2025-22870 [MEDIUM] CWE-115 CVE-2025-22870: Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname componen Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
cvelistv5nvd
CVE-2024-45336MEDIUMCVSS 6.1fixed in 1.22.11≥ 1.23.0-0, < 1.23.5+1 more2025-01-28
CVE-2024-45336 [MEDIUM] CVE-2024-45336: The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a requ The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain
cvelistv5nvd
CVE-2024-24791HIGHCVSS 7.5fixed in 1.21.12≥ 1.22.0-0, < 1.22.52024-07-02
CVE-2024-24791 [HIGH] CVE-2024-24791: The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expec The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseP
cvelistv5nvd
CVE-2023-45288HIGHCVSS 7.5fixed in 1.21.9≥ 1.22.0-0, < 1.22.22024-04-04
CVE-2023-45288 [HIGH] CVE-2023-45288: An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an exce An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are st
cvelistv5nvd
CVE-2023-45289MEDIUMCVSS 4.3fixed in 1.21.8≥ 1.22.0-0, < 1.22.12024-03-05
CVE-2023-45289 [MEDIUM] CVE-2023-45289: When following an HTTP redirect to a domain which is not a subdomain match or exact match of the ini When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redir
cvelistv5nvd
CVE-2023-39325HIGHCVSS 7.5fixed in 1.20.10≥ 1.21.0-0, < 1.21.32023-10-11
CVE-2023-39325 [HIGH] HTTP/2 rapid reset can cause excessive work in net/http HTTP/2 rapid reset can cause excessive work in net/http A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix ap
cvelistv5
CVE-2023-29406MEDIUMCVSS 6.5fixed in 1.19.11≥ 1.20.0-0, < 1.20.62023-07-11
CVE-2023-29406 [MEDIUM] CWE-436 CVE-2023-29406: The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Hos The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
cvelistv5nvd
CVE-2022-41723HIGHCVSS 7.5fixed in 1.19.6≥ 1.20.0-0, < 1.20.12023-02-28
CVE-2022-41723 [HIGH] Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
cvelistv5
CVE-2022-41717MEDIUMCVSS 5.3fixed in 1.18.9≥ 1.19.0-0, < 1.19.42022-12-08
CVE-2022-41717 [MEDIUM] CWE-770 CVE-2022-41717: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 serve An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
cvelistv5nvd
CVE-2022-41720HIGHCVSS 7.5fixed in 1.18.9≥ 1.19.0-0, < 1.19.42022-12-07
CVE-2022-41720 [HIGH] CWE-22 CVE-2022-41720: On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and ht On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide
cvelistv5nvd
CVE-2022-32148MEDIUMCVSS 6.5fixed in 1.17.12≥ 1.18.0-0, < 1.18.42022-08-10
CVE-2022-32148 [MEDIUM] CVE-2022-32148: Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggere Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header.
cvelistv5nvd
CVE-2022-1705MEDIUMCVSS 6.5fixed in 1.17.12≥ 1.18.0-0, < 1.18.42022-08-10
CVE-2022-1705 [MEDIUM] CWE-444 CVE-2022-1705: Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17 Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
cvelistv5nvd