{"id":"CVE-2022-32214","details":"The llhttp parser \u003cv14.20.1, \u003cv16.17.1 and \u003cv18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).","aliases":["BIT-node-2022-32214","BIT-node-min-2022-32214","GHSA-q5vx-44v4-gch4"],"modified":"2026-04-16T04:30:20.041941539Z","published":"2022-07-14T15:15:08.337Z","related":["ALSA-2022:6448","ALSA-2022:6595","CGA-r3m6-hrjp-7j33","SUSE-SU-2022:2415-1","SUSE-SU-2022:2416-1","SUSE-SU-2022:2417-1","SUSE-SU-2022:2425-1","SUSE-SU-2022:2430-1","SUSE-SU-2022:2491-1","SUSE-SU-2022:2551-1","SUSE-SU-2022:2855-1","SUSE-SU-2023:0408-1","SUSE-SU-2023:0419-1"],"references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5326"},{"type":"REPORT","url":"https://hackerone.com/reports/1524692"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/llhttp","events":[{"introduced":"0"},{"fixed":"f014c23bffb327f3749c6222e96247aec73a1caf"},{"introduced":"3ec2251f809073fe8abdb50da6e7acb9d96a2ad9"},{"fixed":"315a1c1b7695c2d1c4e80b359a3e30bc7b3f3f22"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.1.5"},{"introduced":"6.0.0"},{"fixed":"6.0.7"}]}},{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"last_affected":"354b6a93bd1d66f1833489d6fe01a2b0e8f6aff9"},{"introduced":"c1da528bc25c9cc5a8240a7b4f136f5968f6e113"},{"fixed":"50871b58d79c2493df7ed594d543df8a4162f4a4"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"last_affected":"49415500bb1bf51a1fade5ea2d03f3988ecabc25"},{"introduced":"40ecd5601193c316e62e9216e8a4259130686208"},{"fixed":"c98901f00d4b31a9a4b14d161177a7d9a64e36f7"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"0a18e136b4a1e860bb2befcbd1f78661ed5fb5e7"},{"introduced":"0"},{"last_affected":"cea049bcf8bb0f9a6e0095dbd5dffdb14dc8f71b"},{"introduced":"0"},{"fixed":"1a6e52db307f0da605a6f15426727834cfc522d8"}],"database_specific":{"versions":[{"introduced":"14.0.0"},{"last_affected":"14.14.0"},{"introduced":"14.15.0"},{"fixed":"14.20.0"},{"introduced":"16.0.0"},{"last_affected":"16.12.0"},{"introduced":"16.13.0"},{"fixed":"16.16.0"},{"introduced":"18.0.0"},{"fixed":"18.5.0"},{"introduced":"0"},{"last_affected":"11.0"},{"introduced":"0"},{"fixed":"3.3.0"}]}}],"versions":["release/v1.1.0","release/v1.1.1","release/v1.1.2","release/v1.1.3","release/v1.1.4","release/v2.0.0","release/v2.0.1","release/v2.0.2","release/v2.0.3","release/v2.0.4","release/v2.0.5","release/v2.1.0","release/v2.1.1","release/v2.1.3","release/v2.2.0","release/v2.2.1","release/v3.0.0","release/v3.0.1","release/v4.0.0","release/v4.1.0","release/v4.1.1","release/v5.0.0","release/v5.1.0","release/v6.0.0","release/v6.0.1","release/v6.0.2","release/v6.0.3","release/v6.0.4","release/v6.0.5","release/v6.0.6","release/v6.0.7","v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.6","v0.1.0","v0.1.1","v0.1.10","v0.1.100","v0.1.101","v0.1.102","v0.1.103","v0.1.104","v0.1.11","v0.1.12","v0.1.13","v0.1.14","v0.1.15","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.2","v0.1.20","v0.1.21","v0.1.22","v0.1.23","v0.1.24","v0.1.25","v0.1.26","v0.1.27","v0.1.28","v0.1.29","v0.1.3","v0.1.30","v0.1.31","v0.1.32","v0.1.33","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.1.9","v0.1.92","v0.1.93","v0.1.94","v0.1.95","v0.1.96","v0.1.97","v0.1.98","v0.1.99","v0.2.0","v0.3.0","v0.3.1","v0.3.2","v0.3.4","v0.3.5","v0.3.6","v0.3.7","v0.3.8","v0.4.0","v0.5.0","v0.5.1","v0.5.10","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.5-rc1","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.7.0","v0.7.2","v0.7.3","v1.0.1","v1.0.1-release","v1.0.2","v1.0.2-release","v1.0.3","v1.0.4","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.1.4","v1.2.0","v1.3.0","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.4","v1.7.0","v1.7.1","v11.0.0","v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.16.0","v14.16.1","v14.17.0","v14.17.1","v14.17.2","v14.17.3","v14.17.4","v14.17.5","v14.17.6","v14.18.0","v14.18.1","v14.18.2","v14.18.3","v14.19.0","v14.19.1","v14.19.2","v14.19.3","v14.2.0","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.2.0","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.2.0","v18.3.0","v18.4.0","v2.0.0","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.1.0","v2.1.1","v2.1.3","v2.1.4","v2.2.0","v2.2.1","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.4.0","v2.5.0","v3.0.0","v3.1.0","v3.2.0","v6.0.7","v6.0.7a"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32214.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}