HTTP Request Smuggling Affecting github.com/clickhouse/ch-go/compress package, versions <0.65.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCLICKHOUSECHGOCOMPRESS-9717951
  • published16 Apr 2025
  • disclosed12 Apr 2025
  • creditUnknown

Introduced: 12 Apr 2025

NewCVE-2025-1386  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade github.com/ClickHouse/ch-go/compress to version 0.65.0 or higher.

Overview

Affected versions of this package are vulnerable to HTTP Request Smuggling when processing queries. An attacker can smuggle another query packet into the connection stream by using a large, uncompressed malicious external data.

Note:

This is only exploitable if the attacker controls the external data source.

References

CVSS Base Scores

version 4.0
version 3.1