CVE-2024-33452

An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
mitreCNA
---
---
CISA-ADPADP
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
VendorProductVersion
openrestylua-nginx-module
𝑥
≤ 0.10.26
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libnginx-mod-http-lua
bookworm
vulnerable
sid
1:0.10.28-2
fixed
trixie
1:0.10.28-2
fixed
nginx
bullseye
vulnerable
bullseye (security)
1.18.0-6.1+deb11u5
fixed
bookworm
1.22.1-9+deb12u2
fixed
sid
1.26.3-3
fixed
trixie
1.26.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lua-nginx-memcached
plucky
needs-triage
oracular
ignored
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
lua-nginx-redis
plucky
needs-triage
oracular
ignored
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
lua-nginx-websocket
plucky
needs-triage
oracular
ignored
noble
needs-triage
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage