An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request.
References
| Link | Resource |
|---|---|
| https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn | Exploit Third Party Advisory |
| https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/ | Exploit Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/06/msg00026.html |
Configurations
History
No history.
Information
Published : 2025-04-22 16:15
Updated : 2025-11-03 20:16
NVD link : CVE-2024-33452
Mitre link : CVE-2024-33452
CVE.ORG link : CVE-2024-33452
JSON object : View
Products Affected
openresty
- lua-nginx-module
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
