The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-32215

CVE-2022-32215: Llhttp HTTP Request Smuggling Vulnerability

CVE-2022-32215 is an HTTP Request Smuggling vulnerability in the Llhttp parser used by Node.js that arises from incorrect handling of multi-line Transfer-Encoding headers. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: February 18, 2026

CVE-2022-32215 Overview

CVE-2022-32215 is an HTTP Request Smuggling (HRS) vulnerability affecting the llhttp parser in the Node.js http module. The parser fails to correctly handle multi-line Transfer-Encoding headers, allowing attackers to manipulate HTTP request boundaries. This vulnerability enables attackers to bypass security controls, poison web caches, and potentially hijack user sessions by exploiting discrepancies in how front-end and back-end servers interpret malformed HTTP requests.

Critical Impact

This HTTP Request Smuggling vulnerability allows attackers to bypass security controls, poison caches, and potentially hijack sessions by exploiting improper parsing of multi-line Transfer-Encoding headers in Node.js applications.

Affected Products

  • llhttp parser versions prior to v14.20.1, v16.17.1, and v18.9.1
  • Node.js (multiple versions across LTS and current release lines)
  • Fedora 35, 36, and 37
  • Siemens SINEC INS 1.0 (including SP1 and SP2)
  • Debian Linux 11.0
  • Stormshield Management Center

Discovery Timeline

  • 2022-07-14 - CVE-2022-32215 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2022-32215

Vulnerability Analysis

HTTP Request Smuggling occurs when front-end and back-end servers interpret HTTP request boundaries differently. In this case, the llhttp parser in Node.js does not correctly process multi-line Transfer-Encoding headers, creating an opportunity for attackers to craft malicious requests that are interpreted inconsistently by different HTTP processors in the request chain.

The vulnerability resides in the http module's request parsing logic. When a Transfer-Encoding header spans multiple lines (using HTTP header folding), the llhttp parser may misinterpret the header value, leading to disagreements about where one request ends and another begins. This desynchronization enables various attack scenarios including cache poisoning, request hijacking, and security control bypass.

Root Cause

The root cause lies in the llhttp parser's improper handling of obsolete HTTP header folding (continuation lines) specifically within Transfer-Encoding headers. According to RFC 7230, header field values can span multiple lines when subsequent lines begin with whitespace. However, the parser's implementation failed to correctly normalize and validate multi-line Transfer-Encoding headers, creating parsing inconsistencies. This is classified under CWE-444 (Inconsistent Interpretation of HTTP Requests).

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker sends a specially crafted HTTP request to a Node.js application with a malformed multi-line Transfer-Encoding header. When this request passes through a reverse proxy or load balancer before reaching the Node.js backend, the two servers may interpret the request boundaries differently.

The attacker crafts a request where the multi-line Transfer-Encoding header causes the front-end proxy to see one request while the back-end Node.js server interprets it as multiple requests (or vice versa). This allows the attacker to "smuggle" a hidden request that bypasses front-end security controls, potentially hijacking responses meant for other users or poisoning shared caches.

For detailed technical information about the exploitation mechanics, refer to the HackerOne Report #1501679 which documents the original vulnerability disclosure.

Detection Methods for CVE-2022-32215

Indicators of Compromise

  • Unexpected HTTP requests in server logs with malformed or multi-line Transfer-Encoding headers
  • Cache entries containing unexpected or malicious content not matching legitimate application responses
  • Anomalous session behavior where users receive responses intended for other users
  • Server logs showing requests with unusual header folding patterns (whitespace-prefixed continuation lines)

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect and block requests containing multi-line or malformed Transfer-Encoding headers
  • Deploy network intrusion detection systems (NIDS) with signatures for HTTP Request Smuggling patterns
  • Monitor for requests containing both Transfer-Encoding and Content-Length headers simultaneously
  • Audit application logs for requests with header values containing embedded line breaks or continuation characters

Monitoring Recommendations

  • Enable detailed HTTP request logging on both front-end proxies and back-end Node.js servers to identify parsing discrepancies
  • Implement anomaly detection for unusual patterns in request/response timing that may indicate smuggling attempts
  • Monitor cache hit ratios and content integrity for signs of cache poisoning attacks
  • Set up alerts for HTTP 400/502 errors that may indicate request parsing failures

How to Mitigate CVE-2022-32215

Immediate Actions Required

  • Upgrade Node.js to version 14.20.1, 16.17.1, 18.9.1, or later immediately
  • Review and update any directly imported llhttp dependencies to patched versions
  • Configure front-end proxies to reject requests with malformed or multi-line Transfer-Encoding headers
  • Audit application architecture to ensure consistent HTTP parsing across all components

Patch Information

Node.js released security patches addressing this vulnerability in July 2022. The fixed versions are Node.js 14.20.1, 16.17.1, and 18.9.1 or later. Organizations should upgrade to these patched versions or the latest LTS release. For detailed patch information, see the Node.js Security Blog Post.

Additional vendor advisories:

  • Siemens Security Advisory SSA-332410 for SINEC INS
  • Debian Security Advisory DSA-5326 for Debian Linux

Workarounds

  • Configure reverse proxies (nginx, HAProxy) to normalize Transfer-Encoding headers before forwarding to Node.js backends
  • Implement strict HTTP header validation at the edge to reject requests with header folding in Transfer-Encoding
  • Use HTTP/2 end-to-end where possible, as HTTP/2 uses a different framing mechanism that is not susceptible to this class of vulnerability
  • Deploy a WAF with HTTP Request Smuggling protection rules as an interim measure
bash
# Example nginx configuration to mitigate HRS attacks
# Add to server or location block

# Reject requests with invalid Transfer-Encoding
if ($http_transfer_encoding ~* ".*[\r\n].*") {
    return 400;
}

# Ensure only valid Transfer-Encoding values
if ($http_transfer_encoding !~ "^(chunked|compress|deflate|gzip|identity)?$") {
    return 400;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechNodejs

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability88.76%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-444
  • Technical References
  • HackerOne Report #1501679

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Debian Security Advisory DSA-5326
  • Vendor Resources
  • Siemens Security Advisory SSA-332410

  • Node.js Security Blog Post
  • Related CVEs
  • CVE-2023-30589: Node.js HTTP Request Smuggling Vulnerability

  • CVE-2022-35256: Node.js HTTP Request Smuggling Flaw

  • CVE-2022-32213: Llhttp HTTP Request Smuggling Vulnerability

  • CVE-2022-21824: Node.js Prototype Pollution Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English