High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-22019
HighVulnerability Description
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
59 configuration(s) from 2 vendor(s)
cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:20.4.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.2.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.3:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.4:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.6:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.16.1:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.19.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:21.2.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.13.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:20.6.1:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.9.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.1.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.11.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.14.2:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.18.2:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.5.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.18.1:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.14.1:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.16.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.17.1:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.3.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.8.1:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.0.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.17.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.12.1:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.1:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.9.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.8.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.4.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.2:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.3.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.14.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.2.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.12.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.5:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.18.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:20.8.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.6.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.1.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.4.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.0.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.7.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.6.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.11.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.7.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.5.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.0.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.6.1:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.6.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.5.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.15.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:20.10.0:*:*:*:lts:*:*:*
cpe:2.3:a:nodejs:node.js:18.10.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:21.1.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.3.0:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:18.9.1:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.5.1:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:20.3.1:*:*:*:-:*:*:*
2025-Apr-CVE-2024-22019
CVE-2024-22019: None
2024-Feb-CVE-2024-22019
CVE-2024-22019: A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion bypassing standard safeguards like timeouts and body size limits.
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
http://www.openwall.com/lists/oss-security/2024/03/11/1support@hackerone.com Mailing List Third Party Advisory
-
https://hackerone.com/reports/2233486support@hackerone.com Issue Tracking
-
https://security.netapp.com/advisory/ntap-20240315-0004/support@hackerone.com Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/03/11/1af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://hackerone.com/reports/2233486af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://lists.debian.org/debian-lts-announce/2024/09/msg00029.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://security.netapp.com/advisory/ntap-20240315-0004/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
Severity Details
Weakness Type (CWE)
Improper Resource Shutdown or Release
- Description
- The product does not release or incorrectly releases a resource before it is made available for re-use.
- Exploit Likelihood
- Medium
- Typical Severity
- Medium
- Abstraction Level
- Class
Key Information
- Published Date
- February 20, 2024
