Closed devguard-app[bot] closed 3 months ago
Test
Wow direkt aus GitHub
/accept Dieses Risiko ist in Ordnung.
/reopen Müssen wir doch fixen
/a Ein alias
/r Müssen wir doch leider fixen
Noch ein Versuch
Kann ich auch accepten?
Ich möchte es reopen
Das ist ein False-Positive
/r Reopen flaw
/r Reopen
/r Reopen
/r Test
/a Accept this risk
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
Affected component
The vulnerability is in
pkg:golang/stdlib@1.22.3
, detected by thecontainer-scanning
scan.Recommended fix
Upgrade to version 1.22.5 or later.
Risk:
3.45 (Low)
EPSS:
0.04 %
The exploit probability is very low. The vulnerability is unlikely to be exploited in the next 30 days.
Exploit:
Not available
We did not find any exploit available. Neither in GitHub repositories nor in the Exploit-Database. There are no script kiddies exploiting this vulnerability.
Vulnerability Depth:
1
The vulnerability is in a direct dependency of your project.
CVSS-BE:
7.5
CVSS-B:
7.5
More details can be found in DevGuard
We need to fix this.