Skip to content

⬆️ Update dependency h3 to v1.15.5 [SECURITY]#3040

Open
renovate[bot] wants to merge 1 commit intodevelopmentfrom
renovate/npm-h3-vulnerability
Open

⬆️ Update dependency h3 to v1.15.5 [SECURITY]#3040
renovate[bot] wants to merge 1 commit intodevelopmentfrom
renovate/npm-h3-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Jan 15, 2026

This PR contains the following updates:

Package Change Age Confidence
h3 (source) 1.15.31.15.5 age confidence

h3 v1 has Request Smuggling (TE.TE) issue

CVE-2026-23527 / GHSA-mp2g-9vg9-f4cg

More information

Details

I was digging into h3 v1 (specifically v1.15.4) and found a critical HTTP Request Smuggling vulnerability.

Basically, readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive.

The Bug: If I send a request with Transfer-Encoding: ChuNked (mixed case), h3 misses it. Since it doesn't see "chunked" and there's no Content-Length, it assumes the body is empty and processes the request immediately.

This leaves the actual body sitting on the socket, which triggers a classic TE.TE Desync (Request Smuggling) if the app is running behind a Layer 4 proxy or anything that doesn't normalize headers (like AWS NLB or Node proxies).

Vulnerable Code (src/utils/body.ts):

if (
    !Number.parseInt(event.node.req.headers["content-length"] || "") &&
    !String(event.node.req.headers["transfer-encoding"] ?? "")
      .split(",")
      .map((e) => e.trim())
      .filter(Boolean)
      .includes("chunked") // <--- This is the issue. "ChuNkEd" returns false here.
  ) {
    return Promise.resolve(undefined);
  }

I verified this locally:

  • Sent a Transfer-Encoding: ChunKed request without a closing 0 chunk.
  • Express hangs (correctly waiting for data).
  • h3 responds immediately (vulnerable, thinks body is length 0).

Impact: Since H3/Nuxt/Nitro is often used in containerized setups behind TCP load balancers, an attacker can use this to smuggle requests past WAFs or desynchronize the socket to poison other users' connections.

Fix: Just need to normalize the header value before checking: .map((e) => e.trim().toLowerCase())

Severity

  • CVSS Score: 8.9 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

h3js/h3 (h3)

v1.15.5

Compare Source

compare changes

[!IMPORTANT]
Security: Fixed a bug in readBody(event) and readRawBody(event) utils where certain Transfer-Encoding header formats could cause the request body to be ignored.

In some deployments (for example, behind TCP load balancers or non-normalizing proxies), this could allow request smuggling. The handling is now safe and fully compliant. (read more)

🩹 Fixes
  • readRawBody: Fix case-sensitive Transfer-Encoding check causing request smuggling risk (618ccf4)

v1.15.4

Compare Source

compare changes

🩹 Fixes
  • getRequestHost: Return first host from x-forwarded-host (#​1175)
💅 Refactors
  • useSession: Backport SessionManager interface to fix types (#​1058)
🏡 Chore
❤️ Contributors

Configuration

📅 Schedule: (in timezone Europe/Zurich)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot added the dependencies Pull requests that update a dependency file label Jan 15, 2026
@renovate renovate Bot force-pushed the renovate/npm-h3-vulnerability branch from 2f15960 to 230f05e Compare January 19, 2026 18:00
Comment thread server/package.json
"@types/node": "24.0.3",
"@types/web-push": "3.6.4",
"cross-env": "7.0.3",
"h3": "1.15.3",
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No 85 tá dando falha tente colocar outro código

@renovate renovate Bot force-pushed the renovate/npm-h3-vulnerability branch from 230f05e to 580184a Compare February 2, 2026 19:13
@renovate renovate Bot force-pushed the renovate/npm-h3-vulnerability branch from 580184a to 9e38270 Compare February 12, 2026 11:40
@renovate renovate Bot force-pushed the renovate/npm-h3-vulnerability branch from 9e38270 to 18beb04 Compare March 5, 2026 17:45
@renovate renovate Bot changed the title ⬆️ Update dependency h3 to v1.15.5 [SECURITY] ⬆️ Update dependency h3 to v1.15.5 [SECURITY] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/npm-h3-vulnerability branch March 27, 2026 01:38
@renovate renovate Bot changed the title ⬆️ Update dependency h3 to v1.15.5 [SECURITY] - autoclosed ⬆️ Update dependency h3 to v1.15.5 [SECURITY] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/npm-h3-vulnerability branch from 18beb04 to 11ca86a Compare March 30, 2026 18:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant