Home

Description

Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.

PUBLISHED Reserved 2026-04-14 | Published 2026-04-28 | Updated 2026-04-29 | Assigner CPANSec

Problem types

CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

Default status
unaffected

Any version before 0.4018
affected

Timeline

2027-04-12:Issue identified by CPANSec
2027-04-27:Issue reported to software maintainer
2027-04-27:Fix committed to public Github repository
2027-04-27:Updated version uploaded to CPAN

Credits

CPANSec finder

References

www.openwall.com/lists/oss-security/2026/04/29/1

github.com/...ced205f0805027e9d9c0731f8c40b104220604ed.patch patch

metacpan.org/release/MIYAGAWA/Starman-0.4018/changes release-notes

datatracker.ietf.org/doc/html/rfc7230

cve.org (CVE-2026-40560)

nvd.nist.gov (CVE-2026-40560)

Download JSON