First published: Tue Jul 23 2024(Updated: )
In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openr Opentmpfiles | >=1.19.3.1<=1.25.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39702 has been classified with a moderate severity due to its potential for causing denial of service.
To fix CVE-2024-39702, users should upgrade to OpenResty version 1.25.3.1 or later.
CVE-2024-39702 enables Hash Denial of Service (HashDoS) attacks through crafted requests.
OpenResty versions from 1.19.3.1 to 1.25.3.1 are affected by CVE-2024-39702.
CVE-2024-39702 can lead to excessive resource usage during proxy operations, potentially resulting in a denial of service.