CVE-2026-40560

NameCVE-2026-40560
DescriptionStarman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1135229

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
starman (PTS)bullseye0.4015-1vulnerable
bookworm0.4016-1vulnerable
forky, sid, trixie0.4017-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
starmansource(unstable)(unfixed)1135229

Notes

[trixie] - starman <no-dsa> (Minor issue; can be fixed via point release)
[bookworm] - starman <no-dsa> (Minor issue; can be fixed via point release)
https://lists.security.metacpan.org/cve-announce/msg/39426182/
Fixed by: https://github.com/miyagawa/Starman/commit/ced205f0805027e9d9c0731f8c40b104220604ed (0.4018)

Search for package or bug name: Reporting problems