平台
linux
组件
tinyproxy
修复版本
1.11.4
CVE-2026-31842描述了Tinyproxy中HTTP请求解析过程中的一个不同步漏洞。由于对Transfer-Encoding头大小写敏感的比较,攻击者可以发送特制的HTTP请求,导致Tinyproxy错误地处理请求体,可能导致信息泄露或拒绝服务。此漏洞影响Tinyproxy 0–1.11.3版本,已在1.11.4版本中修复。
The vulnerability lies in Tinyproxy's handling of the Transfer-Encoding header. Due to a case-sensitive comparison against "chunked", the proxy can be tricked into believing a request has no body when a crafted request with Transfer-Encoding: Chunked is sent. This misinterpretation can lead to denial of service or potentially allow an attacker to bypass certain security checks by manipulating how Tinyproxy processes incoming requests. While the description doesn't explicitly detail data exfiltration, the ability to manipulate request processing could open avenues for further exploitation depending on the proxy's configuration and the backend servers it connects to.
CVE-2026-31842 was publicly disclosed on April 7, 2026. As of this writing, there are no publicly available proof-of-concept exploits. The vulnerability is not currently listed on CISA KEV. The EPSS score is pending evaluation, but the potential for request manipulation suggests a medium probability of exploitation if a suitable exploit is developed.
Systems utilizing Tinyproxy as a proxy server, particularly those handling sensitive traffic or acting as a gateway to internal resources, are at risk. Shared hosting environments where users have limited control over proxy configuration are also vulnerable.
• linux / server:
journalctl -u tinyproxy -g 'Transfer-Encoding: Chunked'• generic web:
curl -I 'http://your-tinyproxy-server/some-resource' | grep Transfer-Encodingdisclosure
漏洞利用状态
EPSS
0.06% (19% 百分位)
CISA SSVC
The primary mitigation is to upgrade Tinyproxy to version 1.11.4 or later, which contains the fix for this parsing issue. If upgrading immediately is not feasible, consider implementing temporary workarounds. While a direct WAF rule is difficult to implement without deep packet inspection, you could potentially restrict the Transfer-Encoding header to known, safe values. Monitoring Tinyproxy logs for unusual request patterns, particularly those involving the Transfer-Encoding header, can also help detect potential exploitation attempts. After upgrading, confirm the fix by sending a test request with Transfer-Encoding: Chunked and verifying that Tinyproxy handles it correctly without errors.
Actualice Tinyproxy a la versión 1.11.4 o posterior para corregir la vulnerabilidad de desincronización del análisis de solicitudes HTTP. Esta actualización aborda la comparación sensible a mayúsculas y minúsculas del encabezado Transfer-Encoding, evitando que los atacantes provoquen una denegación de servicio o eludir los controles de seguridad.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2026-31842是一个Tinyproxy HTTP请求解析漏洞,攻击者可以利用Transfer-Encoding头伪造请求,导致Tinyproxy错误处理。
如果您的Tinyproxy版本低于1.11.4,则可能受到此漏洞的影响。请尽快升级到最新版本。
升级到Tinyproxy 1.11.4或更高版本可以修复此漏洞。
CVSS 向量