“ParseThru” – Exploiting HTTP Parameter Smuggling in Golang
Common Information
Type Value
UUID f57a801e-12de-482a-9a58-6cebad8e9a66
Fingerprint 3b14010e7cffc085
Analysis status DONE
Considered CTI value 0
Text language
Published July 28, 2022, midnight
Added to db Dec. 2, 2022, 11:42 p.m.
Last updated Dec. 21, 2024, 3:48 a.m.
Headline “ParseThru” – Exploiting HTTP Parameter Smuggling in Golang - Updated October 10, 2022
Title “ParseThru” – Exploiting HTTP Parameter Smuggling in Golang
Detected Hints/Tags/Attributes 35/1/4
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 4
cve-2022-2880
Details Domain 6
semgrep.dev
Details Domain 2
www.oxeye.io
Details Url 1
https://semgrep.dev/s/daniel-abeles