h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openstack |
|
CPEs | cpe:/a:redhat:openstack:17.1::el9 cpe:/a:redhat:openstack:18.0::el9 |
|
Vendors & Products |
Redhat
Redhat openstack |
Tue, 29 Apr 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 24 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 24 Apr 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue. | |
Title | h11 accepts some malformed Chunked-Encoding bodies | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-24T19:02:45.130Z
Reserved: 2025-04-17T20:07:08.556Z
Link: CVE-2025-43859

Updated: 2025-04-24T19:02:18.751Z

Status : Awaiting Analysis
Published: 2025-04-24T19:15:47.060
Modified: 2025-04-29T13:52:28.490
Link: CVE-2025-43859
