[🐸 Frogbot] Update version of golang.org/x/net to [0.1.1-0.20221104162952-702349b0e862] #25
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
📦 Vulnerable Dependencies
✍️ Summary
High
github.com/jfrog/froggit-go:v1.3.1
golang.org/x/net:v0.0.0-20220812174116-3211cb980234
👇 Details
Description:
Go's h2c package implements the
h2c
protocol non-TLS version of HTTP/2.HTTP/2
is a major revision of the HTTP network protocol used by the World Wide Web. It was derived from the earlier experimentalSPDY
protocol, originally developed by Google.A client starts an
HTTP/1.1
connection and sends anUpgrade: h2c
header. If the server supportsHTTP/2
, it replies withHTTP 101 Switching Protocol
status code.The
h2c
package handled this request by handing off the request to theHTTP/2
server.It was discovered that when the request body is not fully-read, the partially-read request would be handed-off to the
HTTP/2
server. This could result in a request smuggling attack, where a request can be treated by a server as 2 separate requests, giving an attacker the ability to create arbitrary requests.Note that the issue only occurs when limiting the size of the initial
HTTP/1.1
request body with aMaxBytesHandler
.JFrog Frogbot