目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2026-2835— Pingora 安全漏洞

EPSS 0.02% · P5
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2026-2835の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing
ソース: NVD (National Vulnerability Database)
脆弱性説明
An HTTP Request Smuggling vulnerability (CWE-444) has been found in Pingora's parsing of HTTP/1.0 and Transfer-Encoding requests. The issue occurs due to improperly allowing HTTP/1.0 request bodies to be close-delimited and incorrect handling of multiple Transfer-Encoding values, allowing attackers to send HTTP/1.0 requests in a way that would desync Pingora’s request framing from backend servers’. Impact This vulnerability primarily affects standalone Pingora deployments in front of certain backends that accept HTTP/1.0 requests. An attacker could craft a malicious payload following this request that Pingora forwards to the backend in order to: * Bypass proxy-level ACL controls and WAF logic * Poison caches and upstream connections, causing subsequent requests from legitimate users to receive responses intended for smuggled requests * Perform cross-user attacks by hijacking sessions or smuggling requests that appear to originate from the trusted proxy IP Cloudflare's CDN infrastructure was not affected by this vulnerability, as its ingress proxy layers forwarded HTTP/1.1 requests only, rejected ambiguous framing such as invalid Content-Length values, and forwarded a single Transfer-Encoding: chunked header for chunked requests. Mitigation: Pingora users should upgrade to Pingora v0.8.0 or higher that fixes this issue by correctly parsing message length headers per RFC 9112 and strictly adhering to more RFC guidelines, including that HTTP request bodies are never close-delimited. As a workaround, users can reject certain requests with an error in the request filter logic in order to stop processing bytes on the connection and disable downstream connection reuse. The user should reject any non-HTTP/1.1 request, or a request that has invalid Content-Length, multiple Transfer-Encoding headers, or Transfer-Encoding header that is not an exact “chunked” string match.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
HTTP请求的解释不一致性(HTTP请求私运)
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Pingora 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Pingora是Cloudflare开源的一个用于构建快速、可靠和可进化网络服务的库。 Pingora v0.8.0之前版本存在安全漏洞,该漏洞源于解析HTTP/1.0和Transfer-Encoding请求时存在HTTP请求夹带技术,可能导致绕过代理级安全控制和跨用户会话劫持。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Cloudflarehttps://github.com/cloudflare/pingora 0 ~ 0.8.0 -

II. CVE-2026-2835の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2026-2835のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Cloudflare · 2026-03-04 · 3 CVEs total

CVE-2026-2833HTTP Request Smuggling via Premature Upgrade
CVE-2026-2836Cache poisoning via insecure-by-default cache key

IV. 関連脆弱性

V. CVE-2026-2835へのコメント

まだコメントはありません


コメントを残す