First published: Fri Feb 16 2024(Updated: )
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/node | <18.19.1 | 18.19.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22019 is considered a high severity vulnerability.
To mitigate CVE-2024-22019, upgrade Node.js to version 18.19.1 or apply the appropriate patches for IBM Cognos Analytics.
CVE-2024-22019 impacts Node.js HTTP servers, allowing for denial of service through resource exhaustion.
Yes, CVE-2024-22019 allows an attacker to perform a denial of service attack by exhausting server resources.
CVE-2024-22019 can be exploited by sending specially crafted HTTP requests with chunked encoding to the affected servers.