The HTTP Garden
The HTTP Garden is a collection of HTTP servers and proxies configured to be composable, along with scripts to interact with them in a way that makes finding vulnerabilities much much easier. For some cool demos of the vulnerabilities that you can find with the HTTP Garden, check out our ShmooCon 2024 talk.
Acknowledgements
We'd like to thank our friends at Galois, Trail of Bits, Narf Industries, and Dartmouth College for making this project possible.
This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under contract number HR0011-19-C-0076.
Getting Started
Dependencies
- The HTTP Garden runs on x86_64 Linux, and is untested on other platforms.
- The target servers are built and run in Docker containers, so you'll need Docker.
- You'll also need the following Python packages, which you can get from PyPI (i.e. with
pip
) or from your system package manager:
docker
- For interacting with Docker
pyyaml
tqdm
If you're installing Python packages with your system package manager, be aware that the package names may need to be prefixed with py3-
, python3-
, or python-
, depending on the system.
- I also highly recommend installing rlwrap from your package manager, because it makes the Garden repl a whole lot more fun.
Building
docker build ./images/http-garden-soil -t http-garden-soil
This image contains some basic utilities, plus a forked AFL++ that facilitates collecting coverage from processes without killing them.
- Build some HTTP servers and proxies:
docker compose build gunicorn hyper nginx haproxy nginx_proxy
There are, of course, way more targets in the HTTP garden than the ones we just built. It's just that building them all takes a long time. Even building these few will take a few minutes!
Running
- Start up some servers and proxies:
docker compose up gunicorn hyper nginx haproxy nginx_proxy
rlwrap python3 tools/repl.py
- Filter a basic GET request through HAProxy, then through an Nginx reverse proxy, then send the result to Gunicorn, Hyper, and Nginx origin servers, and display whether their interpretations match:
garden> payload 'GET / HTTP/1.1rnHost: whateverrnrn' # Set the payload
garden> transduce haproxy nginx_proxy # Run the payload through the reverse proxies
[1]: 'GET / HTTP/1.1rnHost: whateverrnrn'
haproxy
[2]: 'GET / HTTP/1.1rnhost: whateverrnrn'
nginx_proxy
[3]: 'GET / HTTP/1.1rnHost: echornConnection: closernrn'
garden> servers gunicorn hyper nginx # Select the servers
garden> grid # Show their interpretations
g
u
n
i h n
c y g
o p i
r e n
n r x
+-----
gunicorn|✓ ✓ ✓
hyper | ✓ ✓
nginx | ✓
Seems like they all agree. Let's try a more interesting payload:
garden> payload 'POST / HTTP/1.1rnHost: arnTransfer-Encoding: chunkedrnrn0nrn'
garden> grid
g
u
n
i h n
c y g
o p i
r e n
n r x
+-----
gunicorn|✓ ✓ X
hyper | ✓ X
nginx | ✓
There's a discrepancy! This is because Nginx supports n
as a line ending in chunk lines, but Hyper and Gunicorn don't. Nginx is technically violating RFC 9112 here, but the impact is likely minimal.
Directory Layout
images
The images
directory contains a subdirectory for each HTTP server and transducer in the Garden.
Each target gets its own Docker image.
All programs are built from source when possible.
So that we can easily build multiple versions of each target, all targets are paremetrized with a repository URL (APP_REPO
), branch name (APP_BRANCH
), and commit hash (APP_VERSION
).
tools
The tools
directory contains the scripts that are used to interact with the servers. Inside it, you'll find
diagnose_anomalies.py
: A script for enumerating benign HTTP parsing quirks in the systems under test to be ignored during fuzzing,
repl.py
: The primary user interface to the HTTP Garden,
update.py
: A script that updates the commit hashes in docker-compose.yml
,
- ...and a few more scripts that aren't user-facing.
Targets
HTTP Servers
Name |
Runs locally? |
Coverage Collected? |
aiohttp |
yes |
yes |
apache_httpd |
yes |
yes |
apache_tomcat |
yes |
no |
cheroot |
yes |
yes |
cpp_httplib |
yes |
no |
dart_stdlib |
yes |
no |
eclipse_grizzly |
yes |
no |
eclipse_jetty |
yes |
no |
fasthttp |
yes |
no |
go_stdlib |
yes |
no |
gunicorn |
yes |
yes |
h2o |
yes |
yes |
haproxy_fcgi |
yes |
no |
hyper |
yes |
no |
hypercorn |
yes |
yes |
ktor |
yes |
no |
libevent |
yes |
no |
libmicrohttpd |
yes |
no |
libsoup |
yes |
no |
lighttpd |
yes |
yes |
mongoose |
yes |
yes |
netty |
yes |
no |
nginx |
yes |
yes |
node_stdlib |
yes |
no |
openlitespeed |
yes |
no |
openwrt_uhttpd |
yes |
yes |
php_stdlib |
yes |
no |
phusion_passenger |
yes |
no |
protocol_http1 |
yes |
no |
puma |
yes |
no |
servicetalk |
yes |
no |
tornado |
yes |
no |
twisted |
yes |
no |
unicorn |
yes |
no |
uvicorn |
yes |
yes |
waitress |
yes |
yes |
webrick |
yes |
no |
iis |
no |
no |
openbsd_httpd |
no |
no |
HTTP Transducers
Name |
Runs locally? |
apache_httpd_proxy |
yes |
apache_traffic_server |
yes |
go_stdlib_proxy |
yes |
h2o_proxy |
yes |
haproxy |
yes |
haproxy_invalid |
yes |
lighttpd_proxy |
yes |
nghttpx |
yes |
nginx_proxy |
yes |
openlitespeed_proxy |
yes |
pingora |
yes |
pound |
yes |
squid |
yes |
varnish |
yes |
akamai |
no |
awselb_classic |
no |
awselb_application |
no |
aws_cloudfront |
no |
cloudflare |
no |
fastly |
no |
google_classic |
no |
google_global |
no |
iis_proxy |
no |
openbsd_relayd |
no |
Bugs
These are the bugs we've found using the HTTP Garden. If you find some of your own, please submit a PR to add them to this list!
Each bug is described with the following fields:
- Use case: The type of attack an attacker can execute with this bug
- Requirements: Required configuration options or other servers in order for this bug to be exploited.
- Risk: None|Low|Medium|High, followed by a short explanation.
- None: The bug is likely not exploitable.
- Low: The bug might be exploitable, but it requires a really weird config or would rely on a proxy behaving in a way that I've never seen.
- Medium: The bug is likely exploitable, but has only moderate impact or requires an unlikely server/transducer combination.
- High: The bug is exploitable in common configurations and server/transducer combinations.
- Payload: An example payload that triggers the bug
- Affected programs: A list of servers in which this bug is present, along with report and patch timelines. Since some implementation bugs are common, and this keeps them from cluttering the list :)
Server Bugs
These are bugs in the way servers accept and interpret requests.
- The Python
int
constructor is used to parse chunk-sizes, so 0x
, _
, +
, and -
are misinterpreted.
- Use case: Request smuggling
- Requirements: A transducer that interprets chunk-sizes as their longest valid prefix, but forwards them as-is.
- Risk: Medium. See transducer bug 7.
- Payload:
GET / HTTP/1.1rnHost: arnTransfer-Encoding: chunkedrnrn0_2ernrnGET / HTTP/1.1rnHost: arnContent-Length: 5rnrn0rnrn
- Affected programs:
- AIOHTTP:
- August 1, 2023: Reported via GH security advisory.
- October 7, 2023: Fixed in release 3.8.6.
- Gunicorn:
- August 1, 2023: Reported via GH issue.
- December 25, 2023: Fixed in commit.
- Tornado:
- August 2, 2023: Reported via GH security advisory.
- August 10, 2023: Fixed in commit.
x00
, r
, or n
are incorrectly permitted in header values.
- Use case: Request smuggling
- Requirements: A transducer that forwards these bytes in header values, or accepts and forwards
n
as a header line terminator.
- Risk: High. See transducer bugs 10, 12, and 16.
- Payload:
GET / HTTP/1.1rnHost: arnHeader: vnx00raluernrn
- Affected programs:
- AIOHTTP:
- August 1, 2023: Reported via GH security advisory.
- October 7, 2023: Fixed in release 3.8.6.
- Gunicorn:
- January 31, 2024: Reported via GH issue.
- January 31, 2024: Remains unfixed.
- Tornado:
- August 11, 2023: Reported via GH issue.
- January 31, 2024: Remains unfixed.
- Whitespace is incorrectly stripped from the ends of header names.
- Use case: Request smuggling
- Requirements: A transducer that considers whitespace before the
:
to be part of the header name.
- Risk: Low. I'm not aware of any vulnerable transducers, but James Kettle says that at least one exists.
- Payload:
GET / HTTP/1.1rnHost: whateverrnContent-Length : 34rnrnGET / HTTP/1.1rnHost: whateverrnrn
- Affected programs:
- AIOHTTP:
- August 2, 2023: Reported via GH security advisory.
- October 7, 2023: Fixed in release 3.8.6.
- Cheroot:
- February 4, 2024: Reported via GH issue.
- February 4, 2024: Remains unfixed.
- OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- August 14, 2023: Assigned CVE-2023-40518.
- Whitespace is incorrectly stripped from the beginning of the first header name.
- Use case: Request smuggling
- Requirements: A transducer that considers whitespace at the beginning of the first header name to be part of the header name.
- Risk: Low. I'm not aware of any vulnerable transducers.
- Payload:
GET / HTTP/1.1rntContent-Length: 1rnrnX
- Affected programs:
- AIOHTTP:
- August 20, 2023: Reported via GH security advisory comment.
- October 7, 2023: Fixed in release 3.8.6.
- HTTP versions are interpreted as their longest valid prefix.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET /test HTTP/1.32rnrn
- Affected programs:
- AIOHTTP:
- October 14, 2023: Reported via GH issue and PR.
- October 15, 2023: Fixed in commit.
- HTTP methods are interpreted as their longest valid prefix.
- Use case: ACL bypass
- Requirements: A transducer that forwards invalid method names as-is.
- Risk: Medium. Explanation omitted because the corresponding bugs are not yet reported.
- Payload:
G=":<>(e),[T];?" /get HTTP/1.1rnrn
- Affected programs:
- AIOHTTP:
- October 14, 2023: Reported via GH issue and PR.
- October 15, 2023: Fixed in commit.
- URIs are not validated whatsoever.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET ! HTTP/1.1rnrn
- Affected programs:
- AIOHTTP:
- October 16, 2023: Reported via GH issue.
- October 16, 2023: Fixed in PR.
- Some non-ASCII bytes are incorrectly permitted in header names.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET / HTTP/1.1rnxefoo: barrnrn
- Affected programs:
- AIOHTTP:
- October 17, 2023: Reported via PR.
- October 18, 2023: Fixed via merge of above PR.
- Daphne:
- February 4, 2024: Reported via GH issue.
- February 10, 2024: Fixed in commit.
- Mongoose:
- October 13, 2023: Reported via GH issue.
- December 5, 2023: Fixed in commit.
n
is allowed as separating whitespace in a request line.
- Use case: Request smuggling
- Requirements: A transducer that forwards HTTP/0.9 requests with bare
n
as-is, and reuses the underlying connection.
- Risk: Low. I'm not aware of any vulnerable transducers.
- Payload:
GET /nHTTP/1.1rnrn
- Affected programs:
- AIOHTTP:
- October 17, 2023: Reported via PR.
- October 18, 2023: Fixed via merge.
- The Python
int
constructor is used to parse Content-Length
values, so _
, +
, and -
are misinterpreted.
- Use case: Request smuggling
- Requirements: A transducer that interprets
Content-Length
values as their longest valid prefix, but forwards them as-is.
- Risk: Low. I'm not aware of any vulnerable transducers, but Matt Grenfeldt says that at least one exists.
- Payload:
GET / HTTP/1.1rnHost: arnContent-Length: +1_0rnrn0123456789
- Affected programs:
- AIOHTTP:
- August 1, 2023: Reported via GH security advisory.
- October 7, 2023: Fixed in release 3.8.6.
- CPython http.server:
- April 2, 2023: Reported via GH issue.
- April 2, 2023: Fixed in commit.
- Tornado:
- August 2, 2023: Reported via GH security advisory.
- August 10, 2023: Fixed in commit.
- Werkzeug:
- June 1, 2023: Reported via GH issue.
- June 7, 2023: Fixed in commit 88c5c78.
- Requests containing multiple
Transfer-Encoding: chunked
headers are accepted and treated as having no message body.
- Use case: Request smuggling
- Requirements: A transducer that forwards requests containing multiple
Transfer-Encoding
headers.
- Risk: High. See transducer bug 28.
- Payload:
POST / HTTP/1.1rnTransfer-Encoding: chunkedrnTransfer-Encoding: chunkedrnrn1rnZrn0rnrn
- Affected programs:
- Tornado:
- October 7, 2023: Reported via GH security advisory.
- June 6, 2024: Fixed in release of security advisory.
xa0
and x85
are stripped from the beginnings and ends of header values.
- Use case: Request smuggling
- Requirements: A transducer that forwards unknown
Transfer-Encoding
values and treats them as distinct from chunked
.
- Risk: Medium. See transducer bug 18.
- Payload:
POST / HTTP/1.1rnHost: whateverrnTransfer-Encoding: xa0chunkedxa0rnrn0rnrn
- Affected programs:
- Tornado:
- February 4, 2024: Reported via GH security advisory comment.
- February 4, 2024: Remains unfixed.
r
is treated as a line terminator in header field lines.
- Use case: Request smuggling
- Requirements: A transducer that forwards
r
in header names.
- Risk: High. See transducer bug 10.
- Payload:
GET / HTTP/1.1rnVisible: :/rSmuggled: :)rnrn
- Affected programs:
- CPython http.server:
- January 31, 2024: Reported via GH issue.
- January 31, 2024: Remains unfixed.
- Mongoose:
- July 7, 2023: Reported via GH issue.
- July 9, 2023: Fixed in commit 6957c37.
- Disallowed ASCII characters are incorrectly permitted in header names.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET / HTTP/1.1rnx00x01x02x03x04x05x06x07x08tx0bx0cx0ex0fx10x11x12x13x14x15x16x17x18x19x1ax1bx1cx1dx1ex1f "(),/;<=>?@[/]{}: whateverrnrn
- Affected programs:
- Daphne:
- February 4, 2024: Reported via GH issue.
- February 10, 2024: Fixed in commit.
- Mongoose:
- October 13, 2023: Reported via GH issue.
- December 5, 2023: Fixed in commit.
- Tornado:
- August 11, 2023: Reported via GH issue.
- January 31, 2024: Remains unfixed.
OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- HTTP versions are not validated.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET / HTTP/rr1.1rnrn
- Affected programs:
- FastHTTP:
- February 4, 2024: Reported via GH issue.
- February 11, 2024: Fixed in commit.
- Empty
Content-Length
values are treated as though they were 0
.
- Use case: Request smuggling
- Requirements: A transducer that interprets empty
Content-Length
values as anything other than 0.
- Risk: Low. I'm not aware of any such transducer.
- Payload:
GET / HTTP/1.1rnHost: whateverrnContent-Length: rnrn
- Affected programs:
- Go net/http:
- July 31, 2023: Reported via GH issue
- August 11, 2023: Fixed in commit.
- Lighttpd:
- August 1, 2023: Reported via issue tracker.
- August 3, 2023: Fixed in commit.
- OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- Empty chunk-sizes are treated as though they were
0
.
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards extra
rn
s between chunks.
- Risk: Low. I'm not aware of any such transducer.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTransfer-Encoding: chunkedrnrnrnrn
- Affected programs:
- Go net/http:
- December 2, 2023: Reported via GH issue.
- January 4, 2024: Fixed in commit.
- Hyper:
- December 1, 2023: Reported via email.
- December 18, 2023: Fixed in commit.
- Mongoose:
- January 3, 2024: Reported via GH issue.
- January 3, 2024: Fixed in PR.
- Empty header names are erroneously accepted.
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards
rn:rn
, and treats it as the end of the header block.
- Risk: Low. I'm not aware of any such transducer.
- Payload:
GET / HTTP/1.1rn: ignoredrnHost: whateverrnrn
- Affected programs:
- Go net/http:
- January 24, 2024: Reported via GH issue.
- January 30, 2024: Fixed in commit.
- Gunicorn:
- December 4, 2023: Reported via GH issue.
- December 25, 2023: Fixed in commit.
- Node.js:
- October 13, 2023: Reported via GH issue.
- October 17, 2023: Fixed in commit.
- Tornado:
- October 13, 2023: Reported via GH issue comment.
- October 15, 2023: Remains unfixed.
- All non-
rn
whitespace sequences are stripped from the beginnings of header values (after the :
).
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards bare
n
line endings in field lines.
- Risk: Medium. See transducer bug 16.
- Payload:
GET / HTTP/1.1rnHost: arnUseless:nnGET / HTTP/1.1rnrn
- Affected programs:
- Gunicorn:
- June 2, 2023: Reported via email.
- January 31, 2024: Reported via GH issue.
- January 31, 2024: Remains unfixed.
xa0
and x85
bytes are stripped from the ends of header names, before the :
.
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards
xa0
or x85
in header names.
- Risk: Medium. See transducer bug 6.
- Payload:
GET / HTTP/1.1rnHost: arnContent-Lengthx85: 10rnrn0123456789
- Affected programs:
- Gunicorn:
- June 27, 2023: Reported via email.
- December 25, 2023: Fixed in commit.
,chunked
is treated as an encoding distinct from chunked
.
- Use case: Request smuggling
- Requirements: A transducer that forwards the
Transfer-Encoding
value ,chunked
as-is, and interprets it as equivalent to chunked
.
- Risk: High. See transducer bug 9.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTransfer-Encoding: ,chunkedrnContent-Length: 5rnrn0rnrn
- Affected programs:
- Gunicorn:
- November 6, 2023: Reported via GH issue.
- December 25, 2023: Fixed in commit.
- Mongoose:
- November 6, 2023: Reported via GH issue.
- December 1, 2023: Fixed in commit.
- Passenger:
- November 6, 2023: Reported via email.
- January 22, 2024: Fixed in release.
- Invalid chunk-sizes are interpreted as their longest valid prefix.
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards invalidly-prefixed chunk-sizes (e.g. with
0x
prefix).
- Risk: High. See transducer bugs 2 and 19.
- Payload:
GET / HTTP/1.1rnHost: arnTransfer-Encoding: chunkedrnrn0_2ernrnGET / HTTP/1.1rnHost: arnContent-Length: 5rnrn0rnrn
- Affected programs:
- H2O:
- August 1, 2023: Reported via email.
- December 12, 2023: Fixed in PR.
- OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- WEBrick:
- November 9, 2023: Reported via GH issue.
- February 3, 2024: Fixed in PR.
- Requests with multiple conflicting
Content-Length
headers are accepted, prioritizing the first.
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards requests with 2
Content-Length
headers, prioritizing the last.
- Risk: Medium. See transducer bug 22.
- Payload:
GET / HTTP/1.1rnHost: arnContent-Length: 1rnContent-Length: 0rnrnZ
- Affected programs:
- H2O:
- November 30, 2023: Reported via email.
- July 10, 2024: Reported via GH issue.
- July 10, 2024: Remains unfixed.
- OpenLiteSpeed:
- June 26, 2024: Reported via GH issue.
- July 10, 2024: Remains unfixed.
- 8-bit integer overflow in HTTP version numbers.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET / HTTP/4294967295.255rnrn
- Affected programs:
- Libevent:
- January 17, 2024: Submitted PR.
- January 18, 2024: Fixed in merge.
- Chunk-sizes are parsed using
strtoll(,,16)
, so 0x
, +
, and -
prefixes are erroneously accepted.
- Use case: Request smuggling
- Requirements: A transducer that interprets chunk-sizes as their longest valid prefix, but forwards them as-is.
- Risk: Medium. See transducer bug 2.
- Payload:
GET / HTTP/1.1rnTransfer-Encoding: chunkedrnrn
- Affected programs:
- Libevent:
- January 18, 2024: Submitted PR.
- February 18, 2024: Fixed in merge.
- OpenLiteSpeed:
- August 2, 2023: Reported via email.
- August 11, 2023: Fixed in OLS 1.7.18.
- Negative
Content-Length
headers can be used to force the server into an infinite busy loop.
- Use case: DoS
- Requirements: None.
- Risk: High. This bug is trivial to exploit.
- Payload:
GET / HTTP/1.1rnHost: arnContent-Length: -48rnrn
- Affected programs:
- Mongoose:
- April 27, 2023: Reported via email.
- May 16-18, 2023: Fixed in commits 4663090, 926959a, and 2669991.
- Assigned CVE-2023-34188.
- The HTTP header block is truncated upon receipt of a header with no name or value.
- Use case: Request smuggling
- Requirements: A transducer that forwards empty header names.
- Risk: Medium. See bonus bonus bug 2.
- Payload:
GET / HTTP/1.1rn:rnI: am chopped offrnrn
- Affected programs:
- Mongoose:
- June 26, 2023: Reported via GH issue.
- June 29, 2023: Fixed in commit 415bbf2.
- Header names can be separated from values on space alone; no
:
required.
- Use case: Request smuggling
- Requirements: A transducer that forwards header lines that don't contain a
:
.
- Risk: Medium. See transducer bug 14.
- Payload:
GET / HTTP/1.1rnContent-Length 10rnrn0123456789
- Affected programs:
- Mongoose:
- July 7, 2023: Reported via GH issue.
- July 7, 2023: Fixed in commit 5dff282.
- Invalid
Content-Length
headers are interpreted as equivalent to their longest valid prefix.
- Use case: Request smuggling
- Requirements: A transducer that forwards
Content-Length
values with invalid prefixes (e.g. 0x
or +
)
- Risk: High. See transducer bug 1.
- Payload:
GET / HTTP/1.1rnContent-Length: 1ZrnrnZ
- Affected programs:
- Mongoose:
- July 31, 2023: Reported via GH issue
- August 17, 2023: Fixed in commit.
- OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- The header block can be incorrectly terminated on
rnrX
, where X
can be any byte.
- Use case: ???
- Requirements: A transducer that forwards header names beginning with
r
, or allows r
as line-folding start-of-line whitespace.
- Risk: Low. I'm not aware of such a transducer.
- Payload:
GET / HTTP/1.1rnHost: arnrZGET /evil: HTTP/1.1rnHost: arnrn
- Affected programs:
- Node.js:
- July 7, 2023: Reported via HackerOne report.
- July 31, 2023: Fixed in llhttp commit.
- September 16, 2023: Fixed in Node commit.
- Chunk lines are incorrectly terminated on
rX
, where X
can be any byte.
- Use case: Request smuggling.
- Requirements: A transducer that forwards
r
within the optional whitespace in a chunk-ext.
- Risk: High. See transducer bug 3.
- Payload:
GET / HTTP/1.1rnHost: arnTransfer-Encoding: chunkedrnrn5rr;ABCDrn34rnErn0rnrnGET / HTTP/1.1rnHost: arnContent-Length: 5rnrn0rnrn
- Affected programs:
- Node.js:
- July 9, 2023: Reported via HackerOne comment.
- July 31, 2023: Fixed in llhttp commit.
- September 16, 2023: Fixed in Node commit.
Content-Length
headers are interpreted with strtoll(,,0)
, so leading 0
, +
, -
, and 0x
are misinterpreted.
- Use case: Request smuggling
- Requirements: A transducer that forwards leading
0
s in Content-Length
values, which is permitted by the standard.
- Risk: High. This is exploitable against standards-compliant transducers.
- Payload:
GET / HTTP/1.1rnHost: whateverrnContent-Length: 010rnrn01234567
- Affected programs:
- OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- Requests with multiple conflicting
Content-Length
headers are accepted, prioritizing the last.
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards requests with 2
Content-Length
headers, prioritizing the first.
- Risk: Low. I'm not aware of any such transducer, but the existence of one seems extremely likely.
- Payload:
GET / HTTP/1.1rnHost: arnContent-Length: 0rnContent-Length: 1rnrnZ
- Affected programs:
- FastHTTP:
- February 4, 2024: Reported via email.
- February 11, 2024: Fixed in commit.
r
is permitted in header values.
- Use case: ???
- Requirements: A transducer that misinterprets and forwards
r
in header values.
- Risk: Low. I'm not aware of any such transducer.
- Payload:
GET / HTTP/1.1rnHost: whateverrnHeader: varluernrn
- Affected programs:
- OpenLiteSpeed:
- July 31, 2023: Reported via email.
- August 10, 2023: Fixed in OLS 1.7.18.
- Header values are truncated at
x00
.
- Use case: ACL bypass
- Requirements: A transducer that forwards
x00
in header values.
- Risk: Medium. See transducer bug 12.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTest: testx00THESE BYTES GET DROPPEDrnConnection: closernrn
- Affected programs:
- OpenLiteSpeed:
- November 3, 2023: Reported via email.
- July 10, 2024: Fixed on or before this date.
- Libevent:
- January 29, 2024: Reported via GH security advisory.
- January 31, 2024: Remains unfixed.
- Carriage returns are forwarded within the optional whitespace following the semicolon in a chunk extension.
- Use case: Request smuggling
- Requirements: A server that treats
rr
as equivalent to rn
in this location.
- Risk: High. See server bug 31.
- Payload:
POST /abc HTTP/1.1rnTransfer-Encoding: chunkedrnHost: h2o.http-garden.usrnrn41;a=brrXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXrn0rnrnGET /bad_path/pwned HTTP/1.1rnHost: arnContent-Length: 412rnrn0rnrnGET /def HTTP/1.1rnHost: h2o.http-garden.usrnrn
- Affected programs:
- Akamai CDN:
- December 3, 2023: Reported via email.
- July 10, 2024: Fixed on or before this date.
- Header names can be continued across lines.
- Use case: request smuggling.
- Requirements: A transducer that forwards header lines that don't contain a
:
.
- Risk: Medium. See transducer bug 14.
- Payload:
POST / HTTP/1.1rnHost: whateverrnTransfer-rnEncoding: chunkedrnContent-Length: 5rnrn0rnrn
- Affected programs:
- Passenger:
- November 6, 2023: Reported via email.
- January 22, 2024: Fixed in release.
- Empty
Content-Length
in requests are interpreted as ``read until timeout occurs."
- Use case: Request smuggling
- Requirements: A transducer that accepts and forwards empty
Content-Length
header values, and treats them as equivalent to 0.
- Risk: Medium. See transducer bugs 5 and 11.
- Payload:
GET / HTTP/1.1rnHost: localhostrnContent-Length: rnrnGET / HTTP/1.1rnHost: localhostrnrn
- Affected programs:
- Puma:
- June 16, 2023: Reported via email.
- August 17, 2023: Fixed in Puma 6.3.1 and 5.6.7. See advisory.
- Chunked message bodies are terminated on
rnXX
, where XX
can be any two bytes.
- Use case: Request smuggling
- Requirements: A transducer that preserves trailer fields and does not add whitespace between the
:
and value within trailer fields. (ATS is one such server)
- Risk: High. The requirements to exploit this bug do not require the transducer to violate the standards.
- Payload:
GET / HTTP/1.1rnTransfer-Encoding: chunkedrnrn0rnX:POST / HTTP/1.1rnrn
- Affected programs:
- Puma:
- July 31, 2023: Reported via email.
- August 17, 2023: Fixed in Puma 6.3.1 and 5.6.7. See advisory.
- Assigned CVE-2023-40175.
- HTTP methods and versions are not validated.
- Use case: ???
- Requirements: N/A
- Risk: None.
- Payload:
x00 / HTTP/............0596.7407.rnrn
- Affected programs:
- Waitress:
- October 17, 2023: Submitted PR.
- February 4, 2024: Fixed in merge of PR.
xa0
and x85
are stripped from the beginnings and ends of header values, except for the Transfer-Encoding
header.
- Use case: Header value ACL bypass
- Requirements: A transducer that accepts and forwards
xa0
and x85
in place.
- Risk: Medium. The standard allows transducers to forward obs-text in header values.
- Payload:
GET /login HTTP/1.1rnHost: arnUser: x85adminxa0rnrn
- Affected programs:
- Waitress:
- February 4, 2024: Reported via GH issue.
- February 4, 2024: Fixed in commit.
- Empty
Content-Length
values are interpreted as equivalent to 0
, and prioritized over any subsequent Content-Length
values.
- Use case: Request smuggling
- Requirements: A transducer that forwards empty
Content-Length
values before nonempty ones, and interprets the nonempty ones.
- Risk: High. See transducer bug 11.
- Payload:
GET / HTTP/1.1rnContent-Length: rnContent-Length: 43rnrnPOST /evil HTTP/1.1rnContent-Length: 18rnrnGET / HTTP/1.1rnrn
- Affected programs:
- WEBrick:
- August 14, 2023: Reported via GH issue.
- August 15, 2023: Fixed in PR.
x00
is stripped from the ends of header values.
- Use case: ACL bypass
- Requirements: A transducer that forwards
x00
in header values.
- Risk: Medium. See transducer bug 12.
- Payload:
GET / HTTP/1.1rnEvil: evilx00rnrn
- Affected programs:
- WEBrick:
- November 30, 2023: Reported via GH issue.
- February 3, 2024, 2024: Fixed in PR.
- All unknown transfer codings are treated as equivalent to
chunked
.
- Use case: Request smuggling
- Requirements: A transducer that forwards Transfer-Encodings other than
identity
and chunked
. This is allowed by the standard.
- Risk: High. This allows for request smuggling against some standards-compliant transducers.
- Payload:
POST / HTTP/1.1rnHost: arnTransfer-Encoding: bleghrnrn1rnZrn0rnrn
- Affected programs:
- FastHTTP:
- February 4, 2024: Reported via email.
- February 11, 2024: Fixed in commit.
- Connections are closed prematurely when an invalid request is pipelined after a valid request.
- Use case: ???
- Requirements: None.
- Risk: None.
- Payload:
GET / HTTP/1.1rnConnection: closernrnInvalidrnrn
- Affected programs:
- Mongoose:
- January 29, 2024: Reported via GH issue.
- February 13, 2024: Fixed in commit.
- Uvicorn:
- January 29, 2024: Reported via GH discussion comment.
- February 6, 2024: Inadvertently fixed in commit.
- Bytes greater than
x80
are stripped from the beginnings and ends of header values.
- Use case: Host of troubles.
- Requirements: A transducer that forwards Host headers containing bytes greater than
x80
.
- Risk: Medium.
- Payload:
POST / HTTP/1.1rnHost: xffaxffrnTransfer-Encoding: xffchunkedxffrnrn1rnZrn0rnrn
- Affected programs:
- Bun:
- February 13, 2024: Reported via GH issue.
- February 13, 2024: Remains unfixed.
- When an invalid chunk is received, the connection isn't closed, and the start of the next message is placed after the first
rn
following the invalid chunk.
- Use case: Response queue poisoning.
- Requirements: A transducer that forwards invalid chunks.
- Risk: Medium.
- Payload:
POST / HTTP/1.1rnHost: whateverrnTransfer-Encoding: chunkedrnrnINVALID!!!rnGET / HTTP/1.1rnHost: whateverrnrn
- Affected programs:
- Cheroot:
- February 14, 2024: Reported via GH issue.
- February 14, 2024: Remains unfixed.
- Pipelined requests in the initial request buffer are interpreted as the message body of the first request in the buffer, even if it has a
Content-Length: 0
header.
- Use case: Request smuggling
- Requirements: A transducer that doesn't change incoming stream element boundaries.
- Risk: Low. I am not aware of any such transducer
- Payload:
POST / HTTP/1.1rnContent-Length: 0rnConnection:keep-alivernHost: arnid: 0rnrnPOST / HTTP/1.1rnHost: arnid: 1rnContent-Length: 34rnrn
GET / HTTP/1.1rnHost: arnid: 2rnrn
- Affected programs:
- Puma:
- February 2, 2024: Reported via email.
- February 2, 2024: Fixed in commit.
Transducer Bugs
These are bugs in the way transducers interpret, normalize, and forward requests.
0x
-prefixed Content-Length
values are incorrectly accepted and forwarded, without validation of the message body.
- Use case: Request smuggling
- Requirements: A server that either interprets
Content-Length
as its longest valid prefix, or interprets 0x
-prefixed Content-Length
.
- Risk: Medium. See servers bugs 10, 29, and 32.
- Payload:
POST / HTTP/1.1rnHost: akamai.my-domain.coolrnContent-Length: 0x10rnrnZ
- Affected programs:
- Akamai CDN:
- September 7, 2023: Reported via email.
- November 27, 2023: Notified of fix via email.
- Invalid chunk-size values are incorrectly accepted and forwarded.
- Use case: Request smuggling
- Requirements: An HTTP/1.1 backend server
- Risk: High. This bug was exploitable for request smuggling against arbitrary backends.
- Payload:
POST / HTTP/1.1rnHost: akamai.my-domain.coolrnTransfer-Encoding: chunkedrnrnZrnZZrnZZZrnrn
- Affected programs:
- Akamai CDN:
- September 7, 2023: Reported via email.
- November 27, 2023: Notified of fix via email.
r
is incorrectly permitted in chunk-ext whitespace before the ;
.
- Use case: Request smuggling
- Requirements: A server that misinterprets
r
in this location.
- Risk: High. See server bug 31.
- Payload:
POST / HTTP/1.1rnHost: server.my-domain.coolrnTransfer-Encoding: chunkedrnrn2rr;arn02rn41rn0rnrnGET /bad_path/pwned HTTP/1.1rnHost: arnContent-Length: 430rnrn0rnrnGET / HTTP/1.1rnHost: server.my-domain.coolrnrn
- Affected programs:
- Akamai CDN:
- September 7, 2023: Reported via email.
- November 27, 2023: Notified of fix via email.
- Apache Traffic Server:
- September 20, 2023: Reported via GH issue.
- February 13, 2024: Fixed in PR.
- Google Cloud Classic Application Load Balancer:
- September 13, 2023: Reported via Google IssueTracker.
- January 30, 2024: Fixed on or before this date.
- Messages containing invalid chunks are forwarded without their message bodies.
- Use case: ???
- Requirements: N/A
- Risk: None.
- Payload:
POST / HTTP/1.1rnTransfer-Encoding: chunkedrnrn1r0n
- Affected programs:
- Pound:
- June 13, 2024: Reported via GH issue.
- June 14, 2024: Fixed in commit.
- Empty
Content-Length
headers are incorrectly forwarded.
- Use case: Request smuggling
- Requirements: A server that interprets empty
Content-Length
values as anything other than 0
- Risk: Medium. See server bug 38.
- Payload:
GET / HTTP/1.1rnhost: whateverrncontent-length: rnrn
- Affected programs:
- Apache Traffic Server:
- August 2, 2023: Reported via GH issue.
- August 6, 2023: Fixed via PR.
- Disallowed bytes are accepted and forwarded within header names.
- Use case: Request smuggling
- Requirements: A server that misinterprets these invalid bytes within header names.
- Risk: Medium. See server bug 41.
- Payload:
GET / HTTP/1.1rnHost: fanoutrnHeaderx85: valuernrn
- Affected programs:
- Apache Traffic Server:
- June 29, 2023: Reported via email.
- September 18, 2023: Reported via GH issue.
- January 31, 2024: Remains unfixed.
- OpenBSD relayd:
- November 10, 2023: Reported via email.
- November 28, 2023: Patched in commit.
- Chunk-sizes are interpreted as their longest valid prefix, and re-emitted.
- Use case: Request smuggling
- Requirements: A server that interprets
0_
or 0x
prefixes on chunk-sizes.
- Risk: High. See server bugs 1, and 25, and transducer bug 19.
- Payload:
POST / HTTP/1.1rnTransfer-Encoding: chunkedrnrn1these-bytes-never-get-validatedrnZrn0rnrn
- Affected programs:
- Apache Traffic Server:
- October 10, 2023: Reported via GH issue.
- February 13, 2024: Fixed in PR.
- Placeholder :)
Transfer-Encoding: ,chunked
headers are forwarded intact, and interpreted as equivalent to chunked
.
- Use case: Request smuggling
- Requirements: A server that both ignores unknown
Transfer-Encoding
s and treats ,chunked
as distinct from chunked
.
- Risk: High. See server bug 21.
- Payload:
POST / HTTP/1.1rnHost: arnTransfer-Encoding: ,chunkedrnrn0rnrn
- Affected programs:
- Azure CDN:
- October 15, 2023: Reported via MSRC vulnerability report.
- November 29, 2023: Fixed on or before this date.
- December 12, 2023: "this case does not meet the bar for servicing by MSRC as HTTP smuggling is not consider a vulnerability and we will be closing this case."
- nghttpx:
- October 14, 2023: Reported via email.
- October 17, 2023: Fixed in PR.
r
is incorrectly forwarded in header values.
- Use case: Request smuggling
- Requirements: A server that treats
r
as equivalent to rn
within header fields.
- Risk: Medium. See server bug 13.
- Payload:
GET / HTTP/1.1rnInvalid-Header: thisrvaluerisrinvalidrnrn
- Google Cloud Classic Application Load Balancer:
- September 7, 2023: Reported via Google IssueTracker.
- January 30, 2024: Fixed on or before this date.
- Empty
Content-Length
headers are incorrectly forwarded, even in the presence of other Content-Length
headers, as long as the empty Content-Length
header comes first.
- Use case: Request smuggling
- Requirements: A server that interprets empty
Content-Length
values as 0 and accepts multiple Content-Length
headers in incoming requests, prioritizing the first.
- Risk: Medium. See server bug 42.
- Payload:
GET / HTTP/1.1rnhost: whateverrncontent-length: rncontent-length: 59rnrnPOST /evil HTTP/1.1rnhost: whateverrncontent-length: 34rnrnGET / HTTP/1.1rnhost: whateverrnrn
- Affected programs:
- HAProxy:
- August 2, 2023: Reported via GH issue.
- August 9, 2023: Fixed in commit.
- August 10, 2023: Assigned CVE-2023-40225.
x00
is forwarded in header values.
- Use case: ACL bypass
- Requirements: A server that truncates header values at
x00
.
- Risk: Medium. See server bugs 35 and 43, and transducer bug 20.
- Payload:
GET / HTTP/1.1rnHost: google.comx00.kallus.orgrnrn
- Affected programs:
- HAProxy:
- September 19, 2023: Reported via email.
- January 31, 2024: Fixed in commit.
- OpenLiteSpeed:
- November 3, 2023: Reported via email.
- July 10, 2024: Fixed on or before this date.
- Bare
n
is accepted as a chunk line terminator.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
GET / HTTP/1.1rnTransfer-Encoding: chunkedrnrnarn0123456789n0rnrn
- Affected programs:
- HAProxy:
- January 25, 2024: Reported via email.
- January 30, 2024: Fixed in commmits 7b737da and 4837e99.
- Field lines with no
:
are forwarded as-is.
- Use case: Request smuggling
- Requirements: A backend server that misinterprets header field lines with no
:
.
- Risk: Medium. See transducer bugs 28 and 37.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTenst: testrnConnection: closernrn
- Affected programs:
- OpenLiteSpeed:
- November 3, 2023: Reported via email.
- July 10, 2024: Fixed on or before this date.
- Requests containing both
Content-Length
and Transfer-Encoding
headers are forwarded as-is if the Transfer-Encoding
value is unrecognized.
- Use case: Request smuggling
- Requirements: A backend server that treats
,chunked
as equivalent to chunked
, and prioritizes Transfer-Encoding
over Content-Length
. These behaviors are allowed by the standards.
- Risk: High. This allows request smuggling to standards-compliant servers.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTransfer-Encoding: ,chunkedrnContent-Length: 5rnConnection: closernrn0rnrn
- Affected programs:
- OpenLiteSpeed:
- November 3, 2023: Reported via email.
- July 10, 2024: Fixed on or before this date.
- Pound:
- February 4, 2024: Reported via GH issue.
- March 29, 2024: Fixed in commit.
n
is not normalized to rn
in forwarded messages.
- Use case: Request smuggling
- Requirements: A backend server that does not interpret
n
as a line ending in header lines. The standard allows servers to translate n
to
.
- Risk: High. This bug is exploitable against standards-compliant servers.
- Payload:
GET / HTTP/1.1nHost: whatevernConnection: closenn
- Affected programs:
- OpenLiteSpeed:
- November 3, 2023: Reported via email.
- January 31, 2024: Remains unfixed.
- Chunked message bodies containing an extra
rn
before the terminator chunk are un-chunked without replacing the Transfer-Encoding
header with Content-Length
.
- Use case: Request smuggling
- Requirements: None.
- Risk: High. This bug is exploitable against arbitrary backend servers.
- Payload:
POST / HTTP/1.1rnHost: arnTransfer-Encoding: chunkedrnrn17rn0rnrnGET / HTTP/1.1rnrnrnrn0rnrn
- Affected programs:
- OpenLiteSpeed
- November 30, 2023: Reported via email.
- July 10, 2024: Fixed on or before this date.
Transfer-Encoding: ,chunked
headers are forwarded intact, and are not interpreted as equivalent to chunked
.
- Use case: Request smuggling
- Requirements: A server that interprets
,chunked
as equivalent to chunked
, which the standard says you MAY do.
- Risk: High. This is a request smuggling vulnerability that is usable against standards-compliant backends.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTransfer-Encoding: ,chunkedrnContent-Length: 5rnrn0rnrn
- Affected programs:
- OpenBSD relayd:
- November 10, 2023: Reported via email.
- November 28, 2023: Patched in commit.
- Chunk-sizes with
+
, -
, and 0x
prefixes are interpreted and forwarded.
- Use case: Request smuggling
- Requirements: A server that interprets chunk sizes as their longest valid prefix.
- Risk: High. See server bug 22.
- Payload:
POST / HTTP/1.1rnTransfer-Encoding: chunkedrnrn-0x0rnrn
- Affected programs:
- OpenBSD relayd:
- November 10, 2023: Reported via email.
- November 28, 2023: Patched in commit.
- Pound:
- October 10, 2023: Reported via GH issue.
- October 11, 2023: Fixed via commits 60a4f42 and f70db92.
- Headers containing
x00
or n
are concatenated into the previous header's value.
- Use case: Request smuggling
- Requirements: Any standards-compliant backend server.
- Risk: High. This is a generic request smuggling vulnerability.
- Payload:
GET / HTTP/1.1rna:brncx00rnrn
- Affected programs:
- OpenBSD relayd:
- November 10, 2023: Reported via email.
- November 29, 2023: Patched in commit.
- Message bodies are stripped from
GET
requests without removing their Content-Length
headers.
- Use case: Request smuggling
- Requirements: Any backend server that supports pipelining.
- Risk: High. This is a generic request smuggling vulnerability.
- Payload:
GET / HTTP/1.1rnContent-Length: 10rnrn1234567890
- Affected programs:
- OpenBSD relayd:
- November 28, 2023: Reported via email.
- December 1, 2023: Patched in commit.
- Requests containing multiple
Content-Length
headers are forwarded, prioritizing the last.
- Use case: Request smuggling
- Requirements: A server that accepts requests containing multiple
Content-Length
headers, prioritizing the first.
- Risk: High. See server bug 23.
- Payload:
POST / HTTP/1.1rnHost: arnContent-Length: 0rnContent-Length: 31rnrnGET /evil HTTP/1.1rnHost: arnrn
- Affected programs:
- OpenBSD relayd:
- November 30, 2023: Reported via email.
- July 10, 2024: Remains unfixed.
- Requests containing both
Content-Length
and Transfer-Encoding
are forwarded.
- Use case: Request smuggling
- Requirements: A server that prioritizes
Content-Length
over Transfer-Encoding
, or does not support Transfer-Encoding: chunked
.
- Risk: High. This is the classic request smuggling vector.
- Payload:
POST / HTTP/1.1rnHost: arnContent-Length: 5rnTransfer-Encoding: chunkedrnrn0rnrn
- Affected programs:
- OpenBSD relayd:
- November 30, 2023: Reported via email.
- July 10, 2024: Remains unfixed.
- Whitespace-prefixed chunk-sizes are accepted and forwarded.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
POST / HTTP/1.1rnHost: arnTransfer-Encoding: chunkedrnrn 0rnrn
- Affected programs:
- OpenBSD relayd:
- November 30, 2023: Reported via email.
- January 31, 2024: Remains unfixed.
- Pound:
- October 15, 2023: Reported via GH issue.
- November 25, 2023: Fixed in commit.
- Requests containing multiple
Transfer-Encoding: chunked
headers are forwarded, and treated as equivalent to a single such header.
- Use case: Request smuggling
- Requirements: A server that treats multiple
Transfer-Encoding: chunked
headers as not equivalent to no Transfer-Encoding: chunked
, or joins multiple Transfer-Encoding
headers, and treats chunked,chunked
as distinct from chunked
.
- Risk: Medium. See server bug 21.
- Payload:
POST / HTTP/1.1rnHost: whateverrnTransfer-Encoding: chunkedrnTransfer-Encoding: chunkedrnrn0rnrn
- Affected programs:
- Pound:
- October 7, 2023: Reported via GH issue.
- October 12, 2023: Fixed in commit.
Bonus bugs
These are bugs we found incidentally just by setting up the HTTP Garden and sending an example request. They don't really count because they didn't require using the Garden, but I figure I should document them anyway.
- NULL argument passed to
memcpy
in triggers undefined behavior.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload: Any request with an empty message body that will be forwarded to a proxy_fcgi backend.
- Affected programs:
- Apache httpd:
- December 2, 2023: Reported via Bugzilla issue.
- December 19, 2023: Fixed in revision 1914775.
- uwsgi:
- January 1, 2024: Reported via GH issue.
- Februiary 8, 2024: Patched in PR.
- Use-after-free.
- Use case: DoS
- Requirements: The server uses
attach_server_session_to_client
- Risk: Low. While this does crash ATS, it's so easy to notice that a reasonable person would not have deployed a vulnerable instance in production.
- Payload: Any request at all.
- Affected programs:
- Apache Traffic Server:
- July 31, 2023: Reported via GH issue.
- September 13, 2023: Fixed via PR.
- Sending an extra byte after a request with a chunked message body crashes the server with a segfault.
- Use case: DoS
- Requirements: FastCGI is enabled.
- Risk: High. This is a trivial-to-exploit bug that crashes the server.
- Payload:
GET / HTTP/1.1rnHost: whateverrnTransfer-Encoding: chunkedrnrn0rnrnx00
- Affected programs:
- OpenBSD httpd:
- November 1, 2023: Reported via email.
- November 8, 2023: Fixed in commit.
- Incoming chunked request bodies are echoed back before the response is sent.
- Use case: DoS
- Requirements: FastCGI is enabled.
- Risk: Medium. This will invalidate the request stream for any chunked message, which will ruin shared connections.
- Payload:
POST / HTTP/1.1rnHost: whateverrnTransfer-Encoding: chunkedrnrn1rnZrn0rnrn
- Affected programs:
- OpenBSD httpd:
- January 4, 2024: Reported via email.
- January 31, 2024: Remains unfixed.
- NULL dereference upon receipt of any request.
- Use case: DoS
- Requirements:
mod_dir
is enabled with certain configuration options.
- Risk: Low. This bug is so obvious that no one sane would deploy a vulnerable server.
- Payload: Anything at all.
- Affected programs:
- Apache httpd:
- January 24, 2024: Reported via Bugzilla issue.
- January 24, 2024: Remains unfixed.
Bonus Bonus Bugs
These are bugs that we found back when the Garden had HTTP/2 support. We removed HTTP/2 support because it was a little half-baked, but would love to be able to add it back!
- Whitespace characters are not stripped from field values during HTTP/2 to HTTP/1.1 downgrades.
- Use case: ???
- Requirements: N/A
- Risk: None
- Payload:
PRI * HTTP/2.0rnrnSMrnrnx00x00x00x04x00x00x00x00x00x00x00Ex01x05x00x00x00x01x00n:authoritytlocalhostx00x05:pathx01/x00x07:methodx03GETx00x07:schemex04httpx00x05test1x03tat
- Affected programs:
- Envoy:
- July 7, 2023: Reported via GH issue.
- October 7, 2023: Remains unfixed.
- H2O:
- July 7, 2023: Reported via GH issue.
- July 18, 2023: Fixed in PR #3256.
- Varnish Cache:
- July 7, 2023: Reported via GH issue.
- August 22, 2023: Fixed in commit.
- Empty header names are preserved across HTTP/2 to HTTP/1.1 translation, leading to the production of invalid HTTP/1.1.
- Use case: DoS
- Requirements: An HTTP/2 downgrade is being performed, and the backend rejects empty header names (as most do).
- Risk: Low. This bug can be used to make a reasonable server 400, which will break connection sharing.
- Payload:
PRI * HTTP/2.0rnrnSMrnrnx00x00x00x04x00x00x00x00x00x00x00=x01x05x00x00x00x01x00n:authoritytlocalhostx00x05:pathx01/x00x07:methodx03GETx00x07:schemex04httpx00x00x00
- Affected programs:
- H2O:
- July 7, 2023: Reported via GH issue.
- July 18, 2023: Fixed in PR #3256.