CVE-2024-27983
npm vulnerability analysis and mitigation

Overview

CVE-2024-27983 is a high-severity vulnerability affecting Node.js HTTP/2 server implementations in versions 18.x, 20.x, and 21.x. The vulnerability was discovered and disclosed in April 2024. The issue allows an attacker to make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with HTTP/2 CONTINUATION frames (Node.js Blog).

Technical details

The vulnerability occurs when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client, triggering the Http2Session destructor while header frames are still being processed and stored in memory. This creates a race condition that can leave data in nghttp2 memory after reset. The vulnerability has been assigned a CVSS v3.0 base score of 8.2 (HIGH) with vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H (HackerOne).

Impact

Successful exploitation of this vulnerability can lead to a complete denial of service (DoS) of the Node.js HTTP/2 server. The attack requires only a small amount of HTTP/2 frames to be effective, making it particularly dangerous. The vulnerability affects the availability of the server and can potentially lead to addition or modification of data (CERT Advisory).

Mitigation and workarounds

The vulnerability has been patched in Node.js versions 20.12.1 and later. The fix ensures to close the stream when destroying the session. Organizations using affected versions should upgrade to the patched versions immediately. The fix was contributed by Anna Henningsen (Node.js Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management