Pingora Request Smuggling and Cache Poisoning
High severity
GitHub Reviewed
Published
May 22, 2025
to the GitHub Advisory Database
•
Updated May 22, 2025
Description
Published by the National Vulnerability Database
May 22, 2025
Published to the GitHub Advisory Database
May 22, 2025
Reviewed
May 22, 2025
Last updated
May 22, 2025
Pingora versions prior to 0.5.0 which used the caching functionality in pingora-proxy did not properly drain the downstream request body on cache hits.
This allows an attacker to craft malicious HTTP/1.1 requests which could lead to request smuggling or cache poisoning.
This flaw was corrected in commit fda3317ec822678564d641e7cf1c9b77ee3759ff by ensuring that the downstream request body is always drained before a connection can be reused.
See the blog post for more information.
References