Lucene search

K
vulnrichmentGoVULNRICHMENT:CVE-2024-24791
HistoryJul 02, 2024 - 9:28 p.m.

CVE-2024-24791 Denial of service due to improper 100-continue handling in net/http

2024-07-0221:28:25
Go
github.com
6
denial of service
cve-2024-24791
net/http
100-continue handling

AI Score

6.8

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an “Expect: 100-continue” header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending “Expect: 100-continue” requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:go_standard_library:net\\/http:1.21.12:*:*:*:*:*:*:*"
    ],
    "vendor": "go_standard_library",
    "product": "net\\/http",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.21.12",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "1.22.0-0",
        "lessThan": "1.22.5",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

6.8

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-24791