CVE-2024-39702

July 23, 2024, 4:15 p.m.

None
No Score

Description

In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT epository. is unaffected/

Product(s) Impacted

Product Versions
OpenResty
  • ['1.19.3.1', '1.25.3.1']

Weaknesses

Common security weaknesses mapped to this vulnerability.

Timeline

Published: July 23, 2024, 4:15 p.m.
Last Modified: July 23, 2024, 4:15 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

cve@mitre.org

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.