Duplicate Advisory: Pingora Request Smuggling and Cache Poisoning
High severity
GitHub Reviewed
Published
May 22, 2025
to the GitHub Advisory Database
•
Updated Jun 20, 2025
Withdrawn
This advisory was withdrawn on Jun 20, 2025
Description
Published by the National Vulnerability Database
May 22, 2025
Published to the GitHub Advisory Database
May 22, 2025
Reviewed
May 22, 2025
Withdrawn
Jun 20, 2025
Last updated
Jun 20, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-93c7-7xqw-w357. This link is maintained to preserve external references.
Original Description
Pingora versions prior to 0.5.0 which used the caching functionality in pingora-proxy did not properly drain the downstream request body on cache hits.
This allows an attacker to craft malicious HTTP/1.1 requests which could lead to request smuggling or cache poisoning.
This flaw was corrected in commit fda3317ec822678564d641e7cf1c9b77ee3759ff by ensuring that the downstream request body is always drained before a connection can be reused.
See the blog post for more information.
References