The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade pingora-core to version 0.8.0 or higher.
pingora-core is a package containing Pingora's APIs and traits for the core network protocols.
Affected versions of this package are vulnerable to HTTP Request Smuggling via improper parsing of HTTP/1.0 request bodies and multiple Transfer-Encoding values. An attacker can bypass access controls, poison caches, hijack sessions, or perform cross-user attacks by sending specially crafted HTTP requests that desynchronize request framing between the proxy and backend servers.
Note:
This is only exploitable if deployed as a standalone proxy in front of backends that accept HTTP/1.0 requests. Cloudflare customers and Cloudflare's CDN infrastructure were not affected by this vulnerability, as its ingress proxy layers rejected ambiguous framing such as invalid Content-Length values and internally forwarded non-ambiguous message length framing headers.