cvelist/2020/7xxx/CVE-2020-7655.json
2020-05-21 15:01:16 +00:00

62 lines
1.9 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-7655",
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "netius",
"version": {
"version_data": [
{
"version_value": "All versions prior to 1.17.58"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HTTP Request Smuggling"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141",
"url": "https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks."
}
]
}
}