CVE-2024-27982
nodejs: HTTP Request Smuggling via Content Length Obfuscation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a second request within the body of the first.
El equipo ha identificado una vulnerabilidad crítica en el servidor http de la versión más reciente de Node, donde los encabezados con formato incorrecto pueden provocar el contrabando de solicitudes HTTP. Específicamente, si se coloca un espacio antes de un encabezado de longitud de contenido, no se interpreta correctamente, lo que permite a los atacantes introducir de contrabando una segunda solicitud dentro del cuerpo de la primera.
An HTTP Request Smuggling vulnerability was found in Node.js due to Content-Length Obfuscation in the HTTP server. Malformed headers, particularly if a space is inserted before a content-length header, can result in HTTP request smuggling. This flaw allows attackers to inject a second request within the body of the first and poison web caches, bypass web application firewalls, and execute Cross-site scripting (XSS) attacks.
This update for nodejs16 fixes the following issues. Fixed failed assertion in node::http2::Http2Session::~Http2Session that could lead to HTTP/2 server crash. Fixed HTTP Request Smuggling via Content Length Obfuscation.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-02-29 CVE Reserved
- 2024-04-16 CVE Published
- 2025-04-30 CVE Updated
- 2025-07-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://hackerone.com/reports/2237099 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-27982 | 2024-07-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2275392 | 2024-07-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 4.0 < 4.* Search vendor "NodeJS" for product "Node" and version " >= 4.0 < 4.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 5.0 < 5.* Search vendor "NodeJS" for product "Node" and version " >= 5.0 < 5.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 6.0 < 6.* Search vendor "NodeJS" for product "Node" and version " >= 6.0 < 6.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 7.0 < 7.* Search vendor "NodeJS" for product "Node" and version " >= 7.0 < 7.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 8.0 < 8.* Search vendor "NodeJS" for product "Node" and version " >= 8.0 < 8.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 9.0 < 9.* Search vendor "NodeJS" for product "Node" and version " >= 9.0 < 9.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 10.0 < 10.* Search vendor "NodeJS" for product "Node" and version " >= 10.0 < 10.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 11.0 < 11.* Search vendor "NodeJS" for product "Node" and version " >= 11.0 < 11.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 12.0 < 12.* Search vendor "NodeJS" for product "Node" and version " >= 12.0 < 12.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 13.0 < 13.* Search vendor "NodeJS" for product "Node" and version " >= 13.0 < 13.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 14.0 < 14.* Search vendor "NodeJS" for product "Node" and version " >= 14.0 < 14.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 15.0 < 15.* Search vendor "NodeJS" for product "Node" and version " >= 15.0 < 15.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 16.0 < 16.* Search vendor "NodeJS" for product "Node" and version " >= 16.0 < 16.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 17.0 < 17.* Search vendor "NodeJS" for product "Node" and version " >= 17.0 < 17.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 18.0.0 < 18.20.1 Search vendor "NodeJS" for product "Node" and version " >= 18.0.0 < 18.20.1" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 19.0 < 19.* Search vendor "NodeJS" for product "Node" and version " >= 19.0 < 19.*" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 20.0.0 < 20.12.1 Search vendor "NodeJS" for product "Node" and version " >= 20.0.0 < 20.12.1" | en |
Affected
| ||||||
NodeJS Search vendor "NodeJS" | Node Search vendor "NodeJS" for product "Node" | >= 21.0.0 < 21.7.2 Search vendor "NodeJS" for product "Node" and version " >= 21.0.0 < 21.7.2" | en |
Affected
|