CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

Open
LOW (2.6)
  • T

    Tim Bastin detected CVE-2024-24791 with a risk of 2.6

  • logo

    System updated the risk assessment from 2.6 to 1.3

    System recalculated raw risk assessment

  • T

    Tim Bastin fixed CVE-2024-24791

  • T

    Tim Bastin detected CVE-2024-24791 with a risk of 2.6

  • logo

    System updated the risk assessment from 2.6 to 1.3

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.3 to 2.6

    System recalculated raw risk assessment

  • logo

    System removed scanner:

  • logo

    System removed scanner:

  • logo

    System removed scanner:

  • T

    Tim Bastin fixed CVE-2024-24791

  • logo

    System detected CVE-2024-24791 with a risk of 2.6

  • T

    Tim Bastin fixed CVE-2024-24791

  • logo

    System detected CVE-2024-24791 with a risk of 2.6

Add a comment

Mark as False Positive
Last calculated at:

Affected component

Logo von golang stdlib

Installed version:
1.21.8
Fixed in:
v1.21.12

Quick Fix

Update all Dependencies
Update only stdlib
Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 667098114b5ef45c7830e7aa599604fa65eb818f