
Cloud Vulnerability DB
A community-led vulnerabilities database
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js contains a vulnerability related to incorrect parsing and validation of Transfer-Encoding headers. This vulnerability was discovered in July 2022 and was assigned CVE-2022-32213 (Node Blog).
The vulnerability exists in the llhttp parser component of Node.js's http module, which does not correctly parse and validate Transfer-Encoding headers. This parsing flaw can lead to HTTP Request Smuggling (HRS) attacks. The issue was fixed in llhttp v6.0.7 and llhttp v2.1.5, which were subsequently integrated into Node.js (Node Blog).
The vulnerability can lead to HTTP Request Smuggling (HRS) attacks, which could allow attackers to bypass security controls, gain unauthorized access to sensitive data, or perform other malicious actions. The issue affects all versions of the Node.js 18.x, 16.x, and 14.x release lines prior to the patched versions (Node Blog).
The vulnerability has been fixed in Node.js versions 14.20.1, 16.17.1, and 18.9.1. Users should upgrade to these or later versions to mitigate the risk. The fixes are contained in llhttp v6.0.7 and llhttp v2.1.5 which were integrated into Node.js (Node Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."