Impact
In Erlang OTP’s inets httpd module, duplicate Content‑Length headers are not rejected or normalized. The server uses the earliest Content‑Length value for body parsing while many reverse proxies honor the last value, violating RFC 9112 Section 6.3. This discrepancy allows HTTP request smuggling, letting an attacker’s payload be interpreted as the start of the next request on the backend. The flaw is identified as CWE‑444 and can lead to unauthorized request injection or data corruption.
Affected Systems
The vulnerability affects Erlang OTP releases from 17.0 through 28.4.1, 27.3.4.9, and 26.2.5.18, corresponding to inets httpd versions 5.10 up to 9.6.1, 9.3.2.3, and 9.1.0.5. The affected product is referenced by the CPE cpe:2.3:a:erlang:erlang/otp:*:*:*:*:*:*:*:*.
Risk and Exploitability
CVSS score 7 indicates high severity, while an EPSS score of less than 1 % suggests the likelihood of exploitation remains low in the near term. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a remote attacker sending a crafted HTTP request containing duplicate Content‑Length headers directly to the vulnerable httpd instance, resulting in request smuggling and potential arbitrary request injection on the backend.
OpenCVE Enrichment