{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-39326","assignerOrgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","state":"PUBLISHED","assignerShortName":"Go","dateReserved":"2023-07-27T17:05:55.188Z","datePublished":"2023-12-06T16:27:53.832Z","dateUpdated":"2025-02-13T17:02:50.990Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","shortName":"Go","dateUpdated":"2024-01-20T04:06:26.754Z"},"title":"Denial of service via chunk extensions in net/http","descriptions":[{"lang":"en","value":"A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small."}],"affected":[{"vendor":"Go standard library","product":"net/http/internal","collectionURL":"https://pkg.go.dev","packageName":"net/http/internal","versions":[{"version":"0","lessThan":"1.20.12","status":"affected","versionType":"semver"},{"version":"1.21.0-0","lessThan":"1.21.5","status":"affected","versionType":"semver"}],"programRoutines":[{"name":"chunkedReader.beginChunk"},{"name":"readChunkLine"},{"name":"chunkedReader.Read"}],"defaultStatus":"unaffected"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-400: Uncontrolled Resource Consumption"}]}],"references":[{"url":"https://go.dev/issue/64433"},{"url":"https://go.dev/cl/547335"},{"url":"https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"},{"url":"https://pkg.go.dev/vuln/GO-2023-2382"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/"}],"credits":[{"lang":"en","value":"Bartek Nowotarski"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T18:02:06.808Z"},"title":"CVE Program Container","references":[{"url":"https://go.dev/issue/64433","tags":["x_transferred"]},{"url":"https://go.dev/cl/547335","tags":["x_transferred"]},{"url":"https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ","tags":["x_transferred"]},{"url":"https://pkg.go.dev/vuln/GO-2023-2382","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/","tags":["x_transferred"]}]}]}}