Skip to content

Update dependency h11 to v0.16.0 [SECURITY]#291

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-h11-vulnerability
Open

Update dependency h11 to v0.16.0 [SECURITY]#291
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-h11-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Oct 25, 2025

This PR contains the following updates:

Package Change Age Confidence
h11 ==0.14.0==0.16.0 age confidence

GitHub Vulnerability Alerts

CVE-2025-43859

Impact

A leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions.

Details

HTTP/1.1 Chunked-Encoding bodies are formatted as a sequence of "chunks", each of which consists of:

  • chunk length
  • \r\n
  • length bytes of content
  • \r\n

In versions of h11 up to 0.14.0, h11 instead parsed them as:

  • chunk length
  • \r\n
  • length bytes of content
  • any two bytes

i.e. it did not validate that the trailing \r\n bytes were correct, and if you put 2 bytes of garbage there it would be accepted, instead of correctly rejecting the body as malformed.

By itself this is harmless. However, suppose you have a proxy or reverse-proxy that tries to analyze HTTP requests, and your proxy has a different bug in parsing Chunked-Encoding, acting as if the format is:

  • chunk length
  • \r\n
  • length bytes of content
  • more bytes of content, as many as it takes until you find a \r\n

For example, pound had this bug -- it can happen if an implementer uses a generic "read until end of line" helper to consumes the trailing \r\n.

In this case, h11 and your proxy may both accept the same stream of bytes, but interpret them differently. For example, consider the following HTTP request(s) (assume all line breaks are \r\n):

GET /one HTTP/1.1
Host: localhost
Transfer-Encoding: chunked

5
AAAAAXX2
45
0

GET /two HTTP/1.1
Host: localhost
Transfer-Encoding: chunked

0

Here h11 will interpret it as two requests, one with body AAAAA45 and one with an empty body, while our hypothetical buggy proxy will interpret it as a single request, with body AAAAXX20\r\n\r\nGET /two .... And any time two HTTP processors both accept the same string of bytes but interpret them differently, you have the conditions for a "request smuggling" attack. For example, if /two is a dangerous endpoint and the job of the reverse proxy is to stop requests from getting there, then an attacker could use a bytestream like the above to circumvent this protection.

Even worse, if our buggy reverse proxy receives two requests from different users:

GET /one HTTP/1.1
Host: localhost
Transfer-Encoding: chunked

5
AAAAAXX999
0
GET /two HTTP/1.1
Host: localhost
Cookie: SESSION_KEY=abcdef...

...it will consider the first request to be complete and valid, and send both on to the h11-based web server over the same socket. The server will then see the two concatenated requests, and interpret them as one request to /one whose body includes /two's session key, potentially allowing one user to steal another's credentials.

Patches

Fixed in h11 0.15.0.

Workarounds

Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.

Credits

Reported by Jeppe Bonde Weikop on 2025-01-09.


Release Notes

python-hyper/h11 (h11)

v0.16.0

Compare Source

v0.15.0

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested review from a team as code owners October 25, 2025 13:15
@coderabbitai
Copy link
Contributor

coderabbitai bot commented Oct 25, 2025

Important

Review skipped

Bot user detected.

To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

  • 🔍 Trigger a full review

Comment @coderabbitai help to get the list of available commands and usage tips.

@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 9 times, most recently from 8d87455 to 31d9067 Compare October 31, 2025 15:54
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 10 times, most recently from d63f071 to 612eaa3 Compare November 5, 2025 20:23
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 3 times, most recently from 61b9870 to e581d91 Compare November 14, 2025 11:03
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch from e581d91 to 0191a98 Compare November 18, 2025 09:34
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 2 times, most recently from 7e0a1a0 to 781bb99 Compare December 19, 2025 22:56
@github-actions
Copy link

There hasn't been any activity on this pull request recently. Therefore, this pull request has been automatically marked as stale and will be closed if no further activity occurs within seven days. Thank you for your contributions.

@github-actions github-actions bot added stale and removed stale labels Dec 29, 2025
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 4 times, most recently from 14ef7d3 to 2de8064 Compare January 15, 2026 08:55
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 5 times, most recently from 8deeb04 to 3c0c4f4 Compare January 23, 2026 11:32
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 10 times, most recently from 73ce927 to cedb724 Compare February 2, 2026 17:31
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch 4 times, most recently from 4cba642 to 35d4be4 Compare February 10, 2026 12:19
@renovate renovate bot force-pushed the renovate/pypi-h11-vulnerability branch from 35d4be4 to b302192 Compare February 11, 2026 13:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants