Impact
This vulnerability is an HTTP request smuggling flaw caused by improper handling of combined Transfer-Encoding: chunked and Connection: keep-alive headers. An attacker can send crafted requests that are not closed as required, allowing smuggled requests over the persistent connection. The result is unintended request processing and a potential denial of service condition. The weakness corresponds to CWE-444.
Affected Systems
Red Hat Enterprise Linux 10, 6, 7, 8, and 9. The flaw exists in the libSoup component included in these distributions.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity, while the EPSS score is below 1%, showing a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. A remote, unauthenticated client can trigger the flaw from outside the network by sending HTTP requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. Because it exploits transparent HTTP behavior, the attack is feasible over standard HTTP connections, but it requires crafted requests and knowledge of the malformed header pattern.
OpenCVE Enrichment