CVE-2024-24791

July 2, 2024, 10:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

UNKNOWN

Source

security@golang.org

Tags

CVE-2024-24791 details

Published : July 2, 2024, 10:15 p.m.
Last Modified : July 2, 2024, 10:15 p.m.

Description

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS Score

1 2 3 4 5 6 7 8 9 10

Weakness

Weakness Name Description

References

URL Source
https://go.dev/cl/591255 security@golang.org
https://go.dev/issue/67555 security@golang.org
https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ security@golang.org
https://pkg.go.dev/vuln/GO-2024-2963 security@golang.org
This website uses the NVD API, but is not approved or certified by it.