Search for vulnerabilities
Vulnerability details: VCID-5m3h-b4yf-63ew
Vulnerability ID VCID-5m3h-b4yf-63ew
Aliases CVE-2024-33452
Summary An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request.
Status Published
Exploitability 0.5
Weighted Severity 6.9
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33452.json
epss 0.00094 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00123 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00145 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00145 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00145 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
epss 0.00209 https://api.first.org/data/v1/epss?cve=CVE-2024-33452
cvssv3.1 7.7 https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
ssvc Track https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
cvssv3.1 7.7 https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/
ssvc Track https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33452.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L Found at https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T19:26:16Z/ Found at https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L Found at https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T19:26:16Z/ Found at https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/
Exploit Prediction Scoring System (EPSS)
Percentile 0.27744
EPSS Score 0.00094
Published At April 27, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-04-22T21:10:51.879666+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2024/33xxx/CVE-2024-33452.json 36.0.0