Skip to content

Conversation

@yannaingtun
Copy link

Description
This PR fixes a security vulnerability in http_parser_execute() that was cloned from node but did not receive the security patch. The original issue was reported and fixed under nodejs/node@fc70ce0. This PR applies the same patch to eliminate the vulnerability.

References

This patch addresses an HTTP request smuggling vulnerability by:
1. Adding allow_chunked_length parameter
2. Properly handling multiple Transfer-Encoding headers
3. Implementing RFC 7230 Section 3.3.3 checks for Transfer-Encoding and Content-Length conflicts

Based on fix: nodejs/node@fc70ce0
@winlinvip winlinvip added the EnglishNative This issue is conveyed exclusively in English. label Feb 27, 2025
@duiniuluantanqin
Copy link
Member

duiniuluantanqin commented Feb 28, 2025

Please resolve the errors in the pipeline first.

TRANS_BY_GPT4

@winlinvip winlinvip force-pushed the develop branch 2 times, most recently from 195435d to 97e2b64 Compare July 1, 2025 14:39
@winlinvip
Copy link
Member

Thank you, but the PR has been closed for too long a time.

@winlinvip winlinvip closed this Aug 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

EnglishNative This issue is conveyed exclusively in English.

Development

Successfully merging this pull request may close these issues.

3 participants