CVE-2024-33452
NGINX vulnerability analysis and mitigation

Overview

An HTTP Request Smuggling vulnerability (CVE-2024-33452) was discovered in OpenResty lua-nginx-module version 0.10.26 and earlier versions. The vulnerability allows remote attackers to conduct HTTP request smuggling via crafted HEAD requests. The issue was discovered on January 24, 2024, and was patched on March 9, 2024, with CVE assignment following on April 24, 2024 (Benasin Blog).

Technical details

The vulnerability exists in the src/ngxhttpluautil.c file where ngxhttpluasendchainlink incorrectly processes HEAD requests with a body. When processing HTTP/1.1 requests, lua-nginx-module incorrectly parses HEAD requests with a body and treats the body as a new separate request. The vulnerability has received a CVSS v3.1 Base Score of 7.7 (HIGH) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L (NVD).

Impact

The vulnerability enables attackers to bypass frontend proxy protections, serve malicious responses to all users in the same connection pool, and capture responses of other users. The issue affects not only OpenResty but also proxies implemented on top of lua-nginx-module, such as Kong Gateway and Apache APISIX (Benasin Blog).

Mitigation and workarounds

OpenResty has provided a patch in commit e5248aa8203d3e0075822a577c1cdd19f5f1f831 on March 9, 2024. Organizations should upgrade to versions newer than v0.10.26 to mitigate this vulnerability (Benasin Blog).

Community reactions

The vulnerability has gained attention in the security community, with researchers like James Kettle providing insights into the implications of HTTP Request Smuggling vulnerabilities. The discovery has led to further research into real-world applications and potential bounty opportunities at FrogSec Research (Benasin Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management