The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
History

Mon, 09 Sep 2024 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat cost Management
CPEs cpe:/a:redhat:cost_management:1::el8
Vendors & Products Redhat cost Management

Mon, 19 Aug 2024 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat cryostat
CPEs cpe:/a:redhat:cryostat:3::el8
Vendors & Products Redhat
Redhat cryostat

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published: 2024-07-02T21:28:25.677Z

Updated: 2024-08-01T23:28:12.805Z

Reserved: 2024-01-30T16:05:14.758Z

Link: CVE-2024-24791

cve-icon Vulnrichment

Updated: 2024-08-01T23:28:12.805Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-02T22:15:04.833

Modified: 2024-07-08T14:17:39.083

Link: CVE-2024-24791

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-02T00:00:00Z

Links: CVE-2024-24791 - Bugzilla