Loading HuntDB...

GHSA-fxg5-wq6x-vr4w

GitHub Security Advisory

golang.org/x/net/http2/h2c vulnerable to request smuggling attack

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

### Specific Go Packages Affected
golang.org/x/net/http2/h2c

Affected Packages

Go golang.org/x/net
Affected versions: 0.0.0-20220524220425-1d687d428aca (fixed in 0.1.1-0.20221104162952-702349b0e862)

Related CVEs

Key Information

GHSA ID
GHSA-fxg5-wq6x-vr4w
Published
January 14, 2023 12:30 AM
Last Modified
April 4, 2025 7:26 PM
CVSS Score
7.5 /10
Primary Ecosystem
Go
Primary Package
golang.org/x/net
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 18, 2025 6:27 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.