Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-39702

Опубликовано: 23 июл. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.

A flaw was found in the OpenResty package. Affected versions of this package are vulnerable to denial of service (DoS) through the string hashing function. This flaw allows an attacker to cause excessive resource usage and potentially lead to a denial of service with relatively few incoming requests.

Отчет

The HashDoS vulnerability in OpenResty’s lj_str_hash.c file, while impactful, is classified as a moderate severity issue rather than critical. This classification is due to the nature of the attack vector, which requires crafted input to exploit the hashing function and induce excessive resource usage. The exploitability of this vulnerability depends on the attacker’s ability to generate and send specifically designed requests, which may limit its practical impact compared to vulnerabilities that allow for more straightforward or widespread attacks. Additionally, the effect is confined to resource exhaustion, which, although disruptive, does not directly lead to unauthorized data access or system compromise.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 2openrestyWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2299537OpenResty: Hashing function allows HashDoS (Hash Denial of Service) attacks

EPSS

Процентиль: 69%
0.00597
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
больше 1 года назад

In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.

CVSS3: 5.9
github
больше 1 года назад

In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT epository. is unaffected/

EPSS

Процентиль: 69%
0.00597
Низкий

7.5 High

CVSS3