Impact
A flaw in the GNOME libsoup HTTP client/server library permits remote attackers to send specially crafted chunked requests that contain malformed chunk headers, such as a lone line feed. Because libsoup’s parsing logic accepts these headers, it can interpret a single network message as containing multiple HTTP requests. This behavior enables an attacker to smuggle requests through the server, potentially exposing sensitive data that would otherwise remain confined to the original request context.
Affected Systems
Red Hat Enterprise Linux versions 6 through 10, and any installations that use the GNOME libsoup library. No specific subspecifications of libsoup versions are listed in the CNA data.
Risk and Exploitability
The vulnerability has a CVSS score of 5.3, indicating moderate severity. EPSS scores below 1 % suggest a low probability of exploitation at this time, and it is not currently listed in the CISA KEV catalog. Attackers can exploit the flaw without authentication or any user interaction by transmitting crafted HTTP requests directly to a target that uses libsoup as the server component. If successful, request smuggling may lead to unintended processing of multiple HTTP requests and information disclosure.
OpenCVE Enrichment