Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bump golang 1.13.1 (CVE-2019-16276) #39999

Merged
merged 1 commit into from
Sep 27, 2019

Commits on Sep 27, 2019

  1. bump golang 1.13.1 (CVE-2019-16276)

    full diff: golang/go@go1.13...go1.13.1
    
    ```
    Hi gophers,
    
    We have just released Go 1.13.1 and Go 1.12.10 to address a recently reported security issue. We recommend that all affected users update to one of these releases (if you're not sure which, choose Go 1.13.1).
    
    net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1 headers with a space before the colon, in violation of RFC 7230. If a Go server is used behind an uncommon reverse proxy that accepts and forwards but doesn't normalize such invalid headers, the reverse proxy and the server can interpret the headers differently. This can lead to filter bypasses or request smuggling, the latter if requests from separate clients are multiplexed onto the same upstream connection by the proxy. Such invalid headers are now rejected by Go servers, and passed without normalization to Go client applications.
    
    The issue is CVE-2019-16276 and Go issue golang.org/issue/34540.
    
    Thanks to Andrew Stucki, Adam Scarr (99designs.com), and Jan Masarik (masarik.sh) for discovering and reporting this issue.
    
    Downloads are available at https://golang.org/dl for all supported platforms.
    
    Alla prossima,
    Filippo on behalf of the Go team
    ```
    
    From the patch: golang/go@6e6f4aa
    
    ```
    net/textproto: don't normalize headers with spaces before the colon
    
    RFC 7230 is clear about headers with a space before the colon, like
    
    X-Answer : 42
    
    being invalid, but we've been accepting and normalizing them for compatibility
    purposes since CL 5690059 in 2012.
    
    On the client side, this is harmless and indeed most browsers behave the same
    to this day. On the server side, this becomes a security issue when the
    behavior doesn't match that of a reverse proxy sitting in front of the server.
    
    For example, if a WAF accepts them without normalizing them, it might be
    possible to bypass its filters, because the Go server would interpret the
    header differently. Worse, if the reverse proxy coalesces requests onto a
    single HTTP/1.1 connection to a Go server, the understanding of the request
    boundaries can get out of sync between them, allowing an attacker to tack an
    arbitrary method and path onto a request by other clients, including
    authentication headers unknown to the attacker.
    
    This was recently presented at multiple security conferences:
    https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn
    
    net/http servers already reject header keys with invalid characters.
    Simply stop normalizing extra spaces in net/textproto, let it return them
    unchanged like it does for other invalid headers, and let net/http enforce
    RFC 7230, which is HTTP specific. This loses us normalization on the client
    side, but there's no right answer on the client side anyway, and hiding the
    issue sounds worse than letting the application decide.
    ```
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Sep 27, 2019
    Configuration menu
    Copy the full SHA
    8eb23cd View commit details
    Browse the repository at this point in the history