Impact
Tinyproxy up to version 1.11.3 incorrectly processes the Transfer‑Encoding header due to a case‑sensitive string comparison. When an attacker sends a request with "Transfer‑Encoding: Chunked", Tinyproxy treats the request as bodyless, sets the client content length to -1, and forwards the headers downstream while leaving the chunked body data buffered. RFC‑compliant backends then wait for the missing body, causing connections to hang and exhausting backend worker resources. This results in an application‑level denial of service and, in setups where Tinyproxy performs request‑body inspection, a potential bypass of security controls.
Affected Systems
The vulnerable product is Tinyproxy, produced by the Tinyproxy Project. The issue exists in all releases up through 1.11.3 and is mitigated in versions after 1.11.3.
Risk and Exploitability
The vulnerability has a high CVSS score of 8.7 and an EPSS score below 1 %, indicating a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. An unauthenticated attacker can trigger the flaw by issuing an HTTP request containing a case‑sensitive Transfer‑Encoding header, leading to denial of service of connected backend servers.
OpenCVE Enrichment