{"id":"CVE-2022-32213","details":"The llhttp parser \u003cv14.20.1, \u003cv16.17.1 and \u003cv18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).","aliases":["BIT-node-2022-32213","BIT-node-min-2022-32213","GHSA-5689-v88g-g6rv"],"modified":"2026-03-15T22:46:07.590689Z","published":"2022-07-14T15:15:08.287Z","related":["ALSA-2022:6448","ALSA-2022:6595","CGA-5xww-87mx-pmx4","MGASA-2022-0294","MGASA-2022-0354","SUSE-SU-2022:2415-1","SUSE-SU-2022:2416-1","SUSE-SU-2022:2417-1","SUSE-SU-2022:2425-1","SUSE-SU-2022:2430-1","SUSE-SU-2022:2491-1","SUSE-SU-2022:2551-1","SUSE-SU-2022:2855-1","SUSE-SU-2022:3503-1","SUSE-SU-2022:3516-1","SUSE-SU-2022:3524-1","SUSE-SU-2022:3614-1","SUSE-SU-2022:3615-1","SUSE-SU-2022:3616-1","SUSE-SU-2022:3656-1","SUSE-SU-2022:3835-1","SUSE-SU-2023:0408-1","SUSE-SU-2023:0419-1","openSUSE-SU-2024:12199-1","openSUSE-SU-2024:12349-1","openSUSE-SU-2024:12408-1","openSUSE-SU-2025:15095-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICG6CSIB3GUWH5DUSQEVX53MOJW7LYK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCNN3YG2BCLS4ZEKJ3CLSUT6AS7AXTH3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMQK5L5SBYD47QQZ67LEMHNQ662GH3OY/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5326"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/1524555"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/llhttp","events":[{"introduced":"0"},{"fixed":"f014c23bffb327f3749c6222e96247aec73a1caf"},{"introduced":"3ec2251f809073fe8abdb50da6e7acb9d96a2ad9"},{"fixed":"315a1c1b7695c2d1c4e80b359a3e30bc7b3f3f22"},{"introduced":"0"},{"last_affected":"2a48d50c18805d668c09860e26203247c050f8fc"},{"introduced":"0"},{"last_affected":"2a48d50c18805d668c09860e26203247c050f8fc"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.1.5"},{"introduced":"6.0.0"},{"fixed":"6.0.7"},{"introduced":"0"},{"last_affected":"1.0-NA"},{"introduced":"0"},{"last_affected":"1.0-sp1"}]}},{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"last_affected":"354b6a93bd1d66f1833489d6fe01a2b0e8f6aff9"},{"introduced":"c1da528bc25c9cc5a8240a7b4f136f5968f6e113"},{"fixed":"c11b8215bd6388854efcc9302a7383c8c63b8127"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"last_affected":"49415500bb1bf51a1fade5ea2d03f3988ecabc25"},{"introduced":"40ecd5601193c316e62e9216e8a4259130686208"},{"fixed":"6b06e89c7dfccec6792008302af1cee57649445c"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"df3ed1e89299e4c8f006fc20e22265a889c97919"},{"introduced":"0"},{"last_affected":"b65a11e072cf751d8c2a9699451ef80022d4ffbc"},{"introduced":"0"},{"last_affected":"cea049bcf8bb0f9a6e0095dbd5dffdb14dc8f71b"}],"database_specific":{"versions":[{"introduced":"14.0.0"},{"last_affected":"14.14.0"},{"introduced":"14.15.0"},{"fixed":"14.20.1"},{"introduced":"16.0.0"},{"last_affected":"16.12.0"},{"introduced":"16.13.0"},{"fixed":"16.17.1"},{"introduced":"18.0.0"},{"fixed":"18.9.1"},{"introduced":"0"},{"last_affected":"1.0-sp2"},{"introduced":"0"},{"last_affected":"11.0"}]}}],"versions":["v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.16.0","v14.16.1","v14.17.0","v14.17.1","v14.17.2","v14.17.3","v14.17.4","v14.17.5","v14.17.6","v14.18.0","v14.18.1","v14.18.2","v14.18.3","v14.19.0","v14.19.1","v14.19.2","v14.19.3","v14.2.0","v14.20.0","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.16.0","v16.17.0","v16.2.0","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.2.0","v18.3.0","v18.4.0","v18.5.0","v18.6.0","v18.7.0","v18.8.0","v18.9.0","v6.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"fixed":"3.3.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32213.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}