reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1225 reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks. Note: This project is deprecated, and is not maintained any more.
Github GHSA Github GHSA GHSA-x3v4-pxvm-63j8 HTTP Request Smuggling in reel
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T09:33:20.010Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7659

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-01T13:15:10.313

Modified: 2024-11-21T05:37:33.470

Link: CVE-2020-7659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses