h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When an HTTP request using TLS/1.3 early data on top of TCP Fast Open or QUIC 0-RTT packets is received and the IP-address-based access control is used, the access control does not detect and prohibit HTTP requests conveyed by packets with a spoofed source address. This behavior allows attackers on the network to execute HTTP requests from addresses that are otherwise rejected by the address-based access control. The vulnerability has been addressed in commit 15ed15a. Users may disable the use of TCP FastOpen and QUIC to mitigate the issue.
History

Tue, 12 Nov 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dena
Dena h2o
Weaknesses CWE-290
CPEs cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*
Vendors & Products Dena
Dena h2o

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
Description h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When an HTTP request using TLS/1.3 early data on top of TCP Fast Open or QUIC 0-RTT packets is received and the IP-address-based access control is used, the access control does not detect and prohibit HTTP requests conveyed by packets with a spoofed source address. This behavior allows attackers on the network to execute HTTP requests from addresses that are otherwise rejected by the address-based access control. The vulnerability has been addressed in commit 15ed15a. Users may disable the use of TCP FastOpen and QUIC to mitigate the issue.
Title H2O alllows bypassing address-based access control with 0-RTT
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-11T14:24:57.687Z

Updated: 2024-10-11T14:42:24.963Z

Reserved: 2024-08-28T20:21:32.802Z

Link: CVE-2024-45397

cve-icon Vulnrichment

Updated: 2024-10-11T14:42:19.203Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-11T15:15:04.690

Modified: 2024-11-12T20:14:25.083

Link: CVE-2024-45397

cve-icon Redhat

No data.