HTTP Request Smuggling Affecting hyper package, versions <0.12.35


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.93% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-HYPER-564116
  • published1 Apr 2020
  • disclosed19 Mar 2020
  • creditUnknown

Introduced: 19 Mar 2020

CVE-2020-35863  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade hyper to version 0.12.35 or higher.

Overview

hyper is a modern HTTP library.

Affected versions of this package are vulnerable to HTTP Request Smuggling. It allows GET requests to have bodies, even if there is no Transfer-Encoding or Content-Length header. This allows an attacker who can control the body and method of an HTTP request made by hyper to inject a request with headers that would not otherwise be allowed. This allows bypassing CORS restrictions. In combination with other vulnerabilities, such as an exploitable web server listening on loopback, it may allow remote code execution.

References

CVSS Scores

version 3.1