The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat cost Management
|
|
CPEs | cpe:/a:redhat:cost_management:1::el8 | |
Vendors & Products |
Redhat cost Management
|
Mon, 19 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat cryostat |
|
CPEs | cpe:/a:redhat:cryostat:3::el8 | |
Vendors & Products |
Redhat
Redhat cryostat |
MITRE
Status: PUBLISHED
Assigner: Go
Published: 2024-07-02T21:28:25.677Z
Updated: 2024-08-01T23:28:12.805Z
Reserved: 2024-01-30T16:05:14.758Z
Link: CVE-2024-24791
Vulnrichment
Updated: 2024-08-01T23:28:12.805Z
NVD
Status : Awaiting Analysis
Published: 2024-07-02T22:15:04.833
Modified: 2024-07-08T14:17:39.083
Link: CVE-2024-24791
Redhat