CVE-2024-39702

In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.
Configurations

No configuration.

History

26 Nov 2024, 18:15

Type Values Removed Values Added
CWE CWE-407
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

21 Nov 2024, 09:28

Type Values Removed Values Added
References () https://openresty.org/en/ann-1025003002.html - () https://openresty.org/en/ann-1025003002.html -

24 Jul 2024, 12:55

Type Values Removed Values Added
Summary
  • (es) En lj_str_hash.c en OpenResty 1.19.3.1 a 1.25.3.1, la función hash de cadena (utilizada durante el internamiento de cadenas) permite ataques HashDoS (denegación de servicio de hash). Un atacante podría provocar un uso excesivo de recursos durante las operaciones de proxy a través de solicitudes manipuladas, lo que podría provocar una denegación de servicio con relativamente pocas solicitudes entrantes. Esta vulnerabilidad solo existe en la bifurcación OpenResty en el repositorio de GitHub openresty/luajit2. El repositorio LuaJIT/LuaJIT. no se ve afectado.

24 Jul 2024, 05:15

Type Values Removed Values Added
Summary (en) In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT epository. is unaffected/ (en) In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.

23 Jul 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-23 16:15

Updated : 2024-11-26 18:15


NVD link : CVE-2024-39702

Mitre link : CVE-2024-39702

CVE.ORG link : CVE-2024-39702


JSON object : View

Products Affected

No product.

CWE
CWE-407

Inefficient Algorithmic Complexity