diff options
-rw-r--r-- | security/vuxml/vuln/2024.xml | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 992c9f1f2e3b..5346463db642 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,46 @@ + <vuln vid="b0374722-3912-11ef-a77e-901b0e9408dc"> + <topic>go -- net/http: denial of service due to improper 100-continue handling</topic> + <affects> + <package> + <name>go122</name> + <range><lt>1.22.5</lt></range> + </package> + <package> + <name>go121</name> + <range><lt>1.21.12</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Go project reports:</p> + <blockquote cite="https://go.dev/issue/67555"> + <p>net/http: denial of service due to improper 100-continue handling</p> + <p>The net/http HTTP/1.1 client mishandled the case where a + server responds to a request with an "Expect: 100-continue" + header with a non-informational (200 or higher) status. This + mishandling could leave a client connection in an invalid + state, where the next request sent on the connection will + fail.</p> + <p>An attacker sending a request to a + net/http/httputil.ReverseProxy proxy can exploit this + mishandling to cause a denial of service by sending "Expect: + 100-continue" requests which elicit a non-informational + response from the backend. Each such request leaves the + proxy with an invalid connection, and causes one subsequent + request using that connection to fail.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-24791</cvename> + <url>https://go.dev/issue/67555</url> + </references> + <dates> + <discovery>2024-07-02</discovery> + <entry>2024-07-03</entry> + </dates> + </vuln> + <vuln vid="d7efc2ad-37af-11ef-b611-84a93843eb75"> <topic>Apache httpd -- Multiple vulnerabilities</topic> <affects> |