TopVuln

High-risk vulnerability digests

CVE-2021-32715

  • LOW

Details

CVSS v3
3.1
CVSS v2
4.3
NVD published
2021-07-07 20:15:08
EPSS
0.3% probability · 52.8th percentile — 2026-05-03
Affected versions
cpe:2.3:a:hyper:hyper:*:*:*:*:*:rust:*:*
Summary
hyper is an HTTP library for rust. hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in "request smuggling" or "desync attacks". The flaw exists in all prior versions of hyper prior to 0.14.10, if built with `rustc` v1.5.0 or newer. The vulnerability is patched in hyper version 0.14.10. Two workarounds exist: One may reject requests manually that contain a plus sign prefix in the `Content-Length` header or ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix.
Remediation
Not available in our cache.
Exploit info
https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.