← Volver a CVEs
CVE-2025-57804
N/ADescripcion
h2 is a pure-Python implementation of a HTTP/2 protocol stack. Prior to version 4.3.0, an HTTP/2 request splitting vulnerability allows attackers to perform request smuggling attacks by injecting CRLF characters into headers. This occurs when servers downgrade HTTP/2 requests to HTTP/1.1 without properly validating header names/values, enabling attackers to manipulate request boundaries and bypass security controls. This issue has been patched in version 4.3.0.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado8/25/2025
Ultima modificacion11/3/2025
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-93
Referencias
https://github.com/python-hyper/h2/commit/035e9899f95e3709af098f578bfc3cd302298e3a(security-advisories@github.com)
https://github.com/python-hyper/h2/security/advisories/GHSA-847f-9342-265h(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2025/09/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.