Search criteria

2 vulnerabilities found for Starman by MIYAGAWA

CVE-2026-40560 (GCVE-0-2026-40560)

Vulnerability from nvd – Published: 2026-04-28 23:46 – Updated: 2026-04-29 03:04
VLAI?
Title
Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence
Summary
Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.
Severity ?
No CVSS data available.
CWE
  • CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Assigner
Impacted products
Vendor Product Version
MIYAGAWA Starman Affected: 0 , < 0.4018 (custom)
Create a notification for this product.
Credits
CPANSec
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2026-04-29T03:04:48.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2026/04/29/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://cpan.org/modules",
          "defaultStatus": "unaffected",
          "packageName": "Starman",
          "product": "Starman",
          "programFiles": [
            "lib/Starman/Server.pm"
          ],
          "programRoutines": [
            {
              "name": "Starman::Server::_prepare_env"
            }
          ],
          "repo": "https://github.com/miyagawa/Starman",
          "vendor": "MIYAGAWA",
          "versions": [
            {
              "lessThan": "0.4018",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "CPANSec"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence.\n\nStarman incorrectly prioritizes \"Content-Length\" over \"Transfer-Encoding: chunked\" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence.\n\nAn attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-33",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-33 HTTP Request Smuggling"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-444",
              "description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-28T23:52:21.284Z",
        "orgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
        "shortName": "CPANSec"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/miyagawa/Starman/commit/ced205f0805027e9d9c0731f8c40b104220604ed.patch"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://metacpan.org/release/MIYAGAWA/Starman-0.4018/changes"
        },
        {
          "url": "https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.3"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to version 0.4018"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2027-04-12T00:00:00.000Z",
          "value": "Issue identified by CPANSec"
        },
        {
          "lang": "en",
          "time": "2027-04-27T00:00:00.000Z",
          "value": "Issue reported to software maintainer"
        },
        {
          "lang": "en",
          "time": "2027-04-27T00:00:00.000Z",
          "value": "Fix committed to public Github repository"
        },
        {
          "lang": "en",
          "time": "2027-04-27T00:00:00.000Z",
          "value": "Updated version uploaded to CPAN"
        }
      ],
      "title": "Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence",
      "x_generator": {
        "engine": "cpansec-cna-tool 0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
    "assignerShortName": "CPANSec",
    "cveId": "CVE-2026-40560",
    "datePublished": "2026-04-28T23:46:37.780Z",
    "dateReserved": "2026-04-14T11:35:53.644Z",
    "dateUpdated": "2026-04-29T03:04:48.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-40560 (GCVE-0-2026-40560)

Vulnerability from cvelistv5 – Published: 2026-04-28 23:46 – Updated: 2026-04-29 03:04
VLAI?
Title
Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence
Summary
Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.
Severity ?
No CVSS data available.
CWE
  • CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Assigner
Impacted products
Vendor Product Version
MIYAGAWA Starman Affected: 0 , < 0.4018 (custom)
Create a notification for this product.
Credits
CPANSec
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2026-04-29T03:04:48.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2026/04/29/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://cpan.org/modules",
          "defaultStatus": "unaffected",
          "packageName": "Starman",
          "product": "Starman",
          "programFiles": [
            "lib/Starman/Server.pm"
          ],
          "programRoutines": [
            {
              "name": "Starman::Server::_prepare_env"
            }
          ],
          "repo": "https://github.com/miyagawa/Starman",
          "vendor": "MIYAGAWA",
          "versions": [
            {
              "lessThan": "0.4018",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "CPANSec"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence.\n\nStarman incorrectly prioritizes \"Content-Length\" over \"Transfer-Encoding: chunked\" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence.\n\nAn attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-33",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-33 HTTP Request Smuggling"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-444",
              "description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-28T23:52:21.284Z",
        "orgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
        "shortName": "CPANSec"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/miyagawa/Starman/commit/ced205f0805027e9d9c0731f8c40b104220604ed.patch"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://metacpan.org/release/MIYAGAWA/Starman-0.4018/changes"
        },
        {
          "url": "https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.3"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to version 0.4018"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2027-04-12T00:00:00.000Z",
          "value": "Issue identified by CPANSec"
        },
        {
          "lang": "en",
          "time": "2027-04-27T00:00:00.000Z",
          "value": "Issue reported to software maintainer"
        },
        {
          "lang": "en",
          "time": "2027-04-27T00:00:00.000Z",
          "value": "Fix committed to public Github repository"
        },
        {
          "lang": "en",
          "time": "2027-04-27T00:00:00.000Z",
          "value": "Updated version uploaded to CPAN"
        }
      ],
      "title": "Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence",
      "x_generator": {
        "engine": "cpansec-cna-tool 0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
    "assignerShortName": "CPANSec",
    "cveId": "CVE-2026-40560",
    "datePublished": "2026-04-28T23:46:37.780Z",
    "dateReserved": "2026-04-14T11:35:53.644Z",
    "dateUpdated": "2026-04-29T03:04:48.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}