{
  "threat_severity" : "Moderate",
  "public_date" : "2023-06-20T00:00:00Z",
  "bugzilla" : {
    "description" : "nodejs: HTTP Request Smuggling via Empty headers separated by CR",
    "id" : "2219841",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2219841"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L",
    "status" : "verified"
  },
  "details" : [ "The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).\nThe CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20", "A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS)." ],
  "statement" : "The vulnerability is in the llhttp parsing not using the CRLF sequence which violates the HTTP/1.1 specification, which mandates CRLF as the delimiter. While this might result in request smuggling, the added complexity of creating a valid malformed delimited request and having it reach the intended target and then processed,which is why this has been rated as moderate.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-08-08T00:00:00Z",
    "advisory" : "RHSA-2023:4536",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "nodejs:18-8080020230718130356.63b34585"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-08-08T00:00:00Z",
    "advisory" : "RHSA-2023:4537",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "nodejs:16-8080020230718141521.63b34585"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support",
    "release_date" : "2023-09-26T00:00:00Z",
    "advisory" : "RHSA-2023:5361",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.6",
    "package" : "nodejs:16-8060020230906023909.ad008a3a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-07-31T00:00:00Z",
    "advisory" : "RHSA-2023:4330",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "nodejs:18-9020020230717125503.rhel9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-07-31T00:00:00Z",
    "advisory" : "RHSA-2023:4331",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "nodejs-1:16.20.1-1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Extended Update Support",
    "release_date" : "2023-10-09T00:00:00Z",
    "advisory" : "RHSA-2023:5533",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.0",
    "package" : "nodejs-1:16.20.2-1.el9_0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "nodejs:14/nodejs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Software Collections",
    "fix_state" : "Will not fix",
    "package_name" : "rh-nodejs14-nodejs",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-30589\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-30589" ],
  "name" : "CVE-2023-30589",
  "csaw" : false
}