Authentication Bypass Affecting h2o package, versions *


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-H2O-8182988
  • published12 Oct 2024
  • disclosed11 Oct 2024

Introduced: 11 Oct 2024

CVE-2024-45397  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable h2o.

NVD Description

Note: Versions mentioned in the description apply only to the upstream h2o package and not the h2o package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When an HTTP request using TLS/1.3 early data on top of TCP Fast Open or QUIC 0-RTT packets is received and the IP-address-based access control is used, the access control does not detect and prohibit HTTP requests conveyed by packets with a spoofed source address. This behavior allows attackers on the network to execute HTTP requests from addresses that are otherwise rejected by the address-based access control. The vulnerability has been addressed in commit 15ed15a. Users may disable the use of TCP FastOpen and QUIC to mitigate the issue.

CVSS Scores

version 3.1