{"id":"CVE-2022-32215","details":"The llhttp parser \u003cv14.20.1, \u003cv16.17.1 and \u003cv18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).","aliases":["BIT-node-2022-32215","BIT-node-min-2022-32215"],"modified":"2026-04-16T04:32:18.236004813Z","published":"2022-07-14T15:15:08.387Z","related":["ALSA-2022:6448","ALSA-2022:6595","CGA-pgc9-9cfm-76pg","SUSE-SU-2022:2415-1","SUSE-SU-2022:2416-1","SUSE-SU-2022:2417-1","SUSE-SU-2022:2425-1","SUSE-SU-2022:2430-1","SUSE-SU-2022:2491-1","SUSE-SU-2022:2551-1","SUSE-SU-2022:2855-1","SUSE-SU-2022:3524-1","SUSE-SU-2022:3615-1","SUSE-SU-2022:3656-1","SUSE-SU-2023:0408-1","SUSE-SU-2023:0419-1","openSUSE-SU-2024:12370-1","openSUSE-SU-2024:12376-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCNN3YG2BCLS4ZEKJ3CLSUT6AS7AXTH3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMQK5L5SBYD47QQZ67LEMHNQ662GH3OY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICG6CSIB3GUWH5DUSQEVX53MOJW7LYK/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5326"},{"type":"REPORT","url":"https://hackerone.com/reports/1501679"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/llhttp","events":[{"introduced":"0"},{"last_affected":"2a48d50c18805d668c09860e26203247c050f8fc"},{"introduced":"0"},{"last_affected":"2a48d50c18805d668c09860e26203247c050f8fc"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0-NA"},{"introduced":"0"},{"last_affected":"1.0-sp1"}]}},{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"fixed":"c11b8215bd6388854efcc9302a7383c8c63b8127"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"fixed":"6b06e89c7dfccec6792008302af1cee57649445c"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"df3ed1e89299e4c8f006fc20e22265a889c97919"},{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"last_affected":"354b6a93bd1d66f1833489d6fe01a2b0e8f6aff9"},{"introduced":"c1da528bc25c9cc5a8240a7b4f136f5968f6e113"},{"fixed":"50871b58d79c2493df7ed594d543df8a4162f4a4"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"last_affected":"49415500bb1bf51a1fade5ea2d03f3988ecabc25"},{"introduced":"40ecd5601193c316e62e9216e8a4259130686208"},{"fixed":"c98901f00d4b31a9a4b14d161177a7d9a64e36f7"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"0a18e136b4a1e860bb2befcbd1f78661ed5fb5e7"},{"introduced":"0"},{"last_affected":"b65a11e072cf751d8c2a9699451ef80022d4ffbc"},{"introduced":"0"},{"last_affected":"cea049bcf8bb0f9a6e0095dbd5dffdb14dc8f71b"}],"database_specific":{"versions":[{"introduced":"14.0.0"},{"fixed":"14.20.1"},{"introduced":"16.0.0"},{"fixed":"16.17.1"},{"introduced":"18.0.0"},{"fixed":"18.9.1"},{"introduced":"14.0.0"},{"last_affected":"14.14.0"},{"introduced":"14.15.0"},{"fixed":"14.20.0"},{"introduced":"16.0.0"},{"last_affected":"16.12.0"},{"introduced":"16.13.0"},{"fixed":"16.16.0"},{"introduced":"18.0.0"},{"fixed":"18.5.0"},{"introduced":"0"},{"last_affected":"1.0-sp2"},{"introduced":"0"},{"last_affected":"11.0"}]}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.6","v0.1.0","v0.1.1","v0.1.10","v0.1.100","v0.1.101","v0.1.102","v0.1.103","v0.1.104","v0.1.11","v0.1.12","v0.1.13","v0.1.14","v0.1.15","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.2","v0.1.20","v0.1.21","v0.1.22","v0.1.23","v0.1.24","v0.1.25","v0.1.26","v0.1.27","v0.1.28","v0.1.29","v0.1.3","v0.1.30","v0.1.31","v0.1.32","v0.1.33","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.1.9","v0.1.92","v0.1.93","v0.1.94","v0.1.95","v0.1.96","v0.1.97","v0.1.98","v0.1.99","v0.2.0","v0.3.0","v0.3.1","v0.3.2","v0.3.4","v0.3.5","v0.3.6","v0.3.7","v0.3.8","v0.4.0","v0.5.0","v0.5.1","v0.5.10","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.5-rc1","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.7.0","v0.7.2","v0.7.3","v1.0.1","v1.0.1-release","v1.0.2","v1.0.2-release","v1.0.3","v1.0.4","v1.1.0","v1.2.0","v1.3.0","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.4","v1.7.0","v1.7.1","v11.0.0","v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.16.0","v14.16.1","v14.17.0","v14.17.1","v14.17.2","v14.17.3","v14.17.4","v14.17.5","v14.17.6","v14.18.0","v14.18.1","v14.18.2","v14.18.3","v14.19.0","v14.19.1","v14.19.2","v14.19.3","v14.2.0","v14.20.0","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.16.0","v16.17.0","v16.2.0","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.2.0","v18.3.0","v18.4.0","v18.5.0","v18.6.0","v18.7.0","v18.8.0","v18.9.0","v2.0.0","v2.0.1","v2.0.2","v2.1.0","v2.2.0","v2.2.1","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.4.0","v2.5.0","v3.0.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"fixed":"3.3.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32215.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}