CVE-2024-33452

EUVD-2024-31190
An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
CISA-ADPADP
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 71%
Affected Products (NVD)
VendorProductVersion
openrestylua-nginx-module
𝑥
≤ 0.10.26
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libnginx-mod-http-lua
bookworm
no-dsa
forky
1:0.10.29-1
fixed
sid
1:0.10.29-1
fixed
trixie
1:0.10.28-2
fixed
nginx
bookworm
1.22.1-9+deb12u3
no-dsa
bullseye
vulnerable
bullseye (security)
1.18.0-6.1+deb11u5
fixed
forky
1.28.1-2
fixed
sid
1.28.1-2
fixed
trixie
1.26.3-3+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lua-nginx-memcached
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage
xenial
needs-triage
lua-nginx-redis
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage
xenial
needs-triage
lua-nginx-websocket
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage
xenial
needs-triage