高危 HTTP/2 Rapid Reset 拒绝服务漏洞 (CVE-2023-44487)

CVE编号

CVE-2023-44487

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2023-10-13
漏洞描述
HTTP/2协议允许客户端通过发送RST_STREAM帧来指示服务器应该取消之前的流。该协议允许客户端单方面请求取消,这种攻击被称为快速重置。在HTTP/2快速重置攻击中,客户端一次打开大量流,但不等待服务器或代理对每个请求流的响应,而是立即取消每个请求,通过大规模利用请求-取消-请求-取消快速重置攻击,会导致服务器CPU资源快速消耗,达到DoS。
解决建议
协议漏洞,建议关闭HTTP/2协议,降级到HTTP/1.1,或更新各类产品相关安全设置,比如nginx默认配置下最多保持1000个HTTP连接,只要服务器性能不太差默认配置下不受该漏洞影响;而jetty则受漏洞影响,需要更新至最新安全版本。
参考链接
http://www.openwall.com/lists/oss-security/2023/10/13/4
http://www.openwall.com/lists/oss-security/2023/10/13/9
http://www.openwall.com/lists/oss-security/2023/10/18/4
http://www.openwall.com/lists/oss-security/2023/10/18/8
http://www.openwall.com/lists/oss-security/2023/10/19/6
http://www.openwall.com/lists/oss-security/2023/10/20/8
https://access.redhat.com/security/cve/cve-2023-44487
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol...
https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-4...
https://blog.vespa.ai/cve-2023-44487/
https://bugzilla.proxmox.com/show_bug.cgi?id=4988
https://bugzilla.redhat.com/show_bug.cgi?id=2242803
https://bugzilla.suse.com/show_bug.cgi?id=1216123
https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
https://cloud.google.com/blog/products/identity-security/google-cloud-mitigat...
https://cloud.google.com/blog/products/identity-security/how-it-works-the-nov...
https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affec...
https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-htt...
https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
https://github.com/advisories/GHSA-qppj-fm5r-hxr3
https://github.com/advisories/GHSA-vx74-f528-fxqg
https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
https://github.com/akka/akka-http/issues/4323
https://github.com/alibaba/tengine/issues/1872
https://github.com/apache/apisix/issues/10320
https://github.com/apache/httpd-site/pull/10
https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152...
https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
https://github.com/apache/trafficserver/pull/10564
https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
https://github.com/Azure/AKS/issues/3947
https://github.com/bcdannyboy/CVE-2023-44487
https://github.com/caddyserver/caddy/issues/5877
https://github.com/caddyserver/caddy/releases/tag/v2.7.5
https://github.com/dotnet/announcements/issues/277
https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/...
https://github.com/eclipse/jetty.project/issues/10679
https://github.com/envoyproxy/envoy/pull/30055
https://github.com/etcd-io/etcd/issues/16740
https://github.com/facebook/proxygen/pull/466
https://github.com/golang/go/issues/63417
https://github.com/grpc/grpc-go/pull/6703
https://github.com/h2o/h2o/pull/3291
https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
https://github.com/haproxy/haproxy/issues/2312
https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a...
https://github.com/junkurihara/rust-rpxy/issues/97
https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b...
https://github.com/kazu-yamamoto/http2/issues/93
https://github.com/Kong/kong/discussions/11741
https://github.com/kubernetes/kubernetes/pull/121120
https://github.com/line/armeria/pull/5232
https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae...
https://github.com/micrictor/http2-rst-stream
https://github.com/microsoft/CBL-Mariner/pull/6381
https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
https://github.com/nghttp2/nghttp2/pull/1961
https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
https://github.com/ninenines/cowboy/issues/1615
https://github.com/nodejs/node/pull/50121
https://github.com/openresty/openresty/issues/930
https://github.com/opensearch-project/data-prepper/issues/3474
https://github.com/oqtane/oqtane.framework/discussions/3367
https://github.com/projectcontour/contour/pull/5826
https://github.com/tempesta-tech/tempesta/issues/1986
https://github.com/varnishcache/varnish-cache/issues/3996
https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
https://istio.io/latest/news/security/istio-security-2023-004/
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html
https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html
https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPL...
https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-str...
https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-den...
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
https://my.f5.com/manage/s/article/K000137106
https://netty.io/news/2023/10/10/4-1-100-Final.html
https://news.ycombinator.com/item?id=37830987
https://news.ycombinator.com/item?id=37830998
https://news.ycombinator.com/item?id=37831062
https://news.ycombinator.com/item?id=37837043
https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highligh...
https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20231016-0001/
https://security.paloaltonetworks.com/CVE-2023-44487
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
https://ubuntu.com/security/CVE-2023-44487
https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-da...
https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerab...
https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ev...
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
https://www.debian.org/security/2023/dsa-5540
https://www.debian.org/security/2023/dsa-5549
https://www.debian.org/security/2023/dsa-5558
https://www.debian.org/security/2023/dsa-5570
https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-rese...
https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
https://www.openwall.com/lists/oss-security/2023/10/10/6
https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 akka http_server * Up to
(excluding)
10.5.3
运行在以下环境
应用 amazon opensearch_data_prepper * Up to
(excluding)
2.5.0
运行在以下环境
应用 apache apisix * Up to
(excluding)
3.6.1
运行在以下环境
应用 apache solr * Up to
(excluding)
9.4.0
运行在以下环境
应用 apache tomcat * From
(including)
10.1.0
Up to
(including)
10.1.13
运行在以下环境
应用 apache tomcat * From
(including)
8.5.0
Up to
(including)
8.5.93
运行在以下环境
应用 apache tomcat * From
(including)
9.0.0
Up to
(including)
9.0.80
运行在以下环境
应用 apache tomcat 11.0.0 -
运行在以下环境
应用 apache traffic_server * From
(including)
8.0.0
Up to
(excluding)
8.1.9
运行在以下环境
应用 apache traffic_server * From
(including)
9.0.0
Up to
(excluding)
9.2.3
运行在以下环境
应用 apple swiftnio_http/2 * Up to
(excluding)
1.28.0
运行在以下环境
应用 caddyserver caddy * Up to
(excluding)
2.7.5
运行在以下环境
应用 dena h2o * Up to
(excluding)
2023-10-10
运行在以下环境
应用 eclipse jetty * Up to
(excluding)
9.4.53
运行在以下环境
应用 eclipse jetty * From
(including)
10.0.0
Up to
(excluding)
10.0.17
运行在以下环境
应用 eclipse jetty * From
(including)
11.0.0
Up to
(excluding)
11.0.17
运行在以下环境
应用 eclipse jetty * From
(including)
12.0.0
Up to
(excluding)
12.0.2
运行在以下环境
应用 envoyproxy envoy 1.24.10 -
运行在以下环境
应用 envoyproxy envoy 1.25.9 -
运行在以下环境
应用 envoyproxy envoy 1.26.4 -
运行在以下环境
应用 envoyproxy envoy 1.27.0 -
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_access_policy_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_advanced_web_application_firewall * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_advanced_web_application_firewall * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_advanced_web_application_firewall * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_advanced_web_application_firewall * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_advanced_web_application_firewall 17.1.0 -
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_analytics 17.1.0 -
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_application_acceleration_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_application_security_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_application_visibility_and_reporting * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_application_visibility_and_reporting * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_application_visibility_and_reporting * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_application_visibility_and_reporting * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_application_visibility_and_reporting 17.1.0 -
运行在以下环境
应用 f5 big-ip_carrier-grade_nat * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_carrier-grade_nat * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_carrier-grade_nat * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_carrier-grade_nat * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_carrier-grade_nat 17.1.0 -
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_ddos_hybrid_defender 17.1.0 -
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_domain_name_system 17.1.0 -
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_fraud_protection_service 17.1.0 -
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_global_traffic_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_link_controller 17.1.0 -
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_local_traffic_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_next 20.0.1 -
运行在以下环境
应用 f5 big-ip_next_service_proxy_for_kubernetes * From
(including)
1.5.0
Up to
(including)
1.8.2
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager 17.1.0 -
运行在以下环境
应用 f5 big-ip_ssl_orchestrator * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_ssl_orchestrator * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_ssl_orchestrator * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_ssl_orchestrator * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_ssl_orchestrator 17.1.0 -
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_webaccelerator 17.1.0 -
运行在以下环境
应用 f5 big-ip_websafe * From
(including)
13.1.0
Up to
(including)
13.1.5
运行在以下环境
应用 f5 big-ip_websafe * From
(including)
14.1.0
Up to
(including)
14.1.5
运行在以下环境
应用 f5 big-ip_websafe * From
(including)
15.1.0
Up to
(including)
15.1.10
运行在以下环境
应用 f5 big-ip_websafe * From
(including)
16.1.0
Up to
(including)
16.1.4
运行在以下环境
应用 f5 big-ip_websafe 17.1.0 -
运行在以下环境
应用 f5 nginx * From
(including)
1.9.5
Up to
(including)
1.25.2
运行在以下环境
应用 f5 nginx_ingress_controller * From
(including)
2.0.0
Up to
(including)
2.4.2
运行在以下环境
应用 f5 nginx_ingress_controller * From
(including)
3.0.0
Up to
(including)
3.3.0
运行在以下环境
应用 f5 nginx_plus * From
(including)
r25
Up to
(excluding)
r29
运行在以下环境
应用 f5 nginx_plus r29 -
运行在以下环境
应用 f5 nginx_plus r30 -
运行在以下环境
应用 facebook proxygen * Up to
(excluding)
2023.10.16.00
运行在以下环境
应用 golang go * Up to
(excluding)
1.20.10
运行在以下环境
应用 golang go * From
(including)
1.21.0
Up to
(excluding)
1.21.3
运行在以下环境
应用 golang http2 * Up to
(excluding)
0.17.0
运行在以下环境
应用 golang networking * Up to
(excluding)
0.17.0
运行在以下环境
应用 grpc grpc * Up to
(excluding)
1.56.3
运行在以下环境
应用 grpc grpc * From
(including)
1.58.0
Up to
(excluding)
1.58.3
运行在以下环境
应用 grpc grpc 1.57.0 -
运行在以下环境
应用 ietf http 2.0 -
运行在以下环境
应用 istio istio * Up to
(excluding)
1.17.6
运行在以下环境
应用 istio istio * From
(including)
1.18.0
Up to
(excluding)
1.18.3
运行在以下环境
应用 istio istio * From
(including)
1.19.0
Up to
(excluding)
1.19.1
运行在以下环境
应用 jenkins jenkins * Up to
(including)
2.414.2
运行在以下环境
应用 jenkins jenkins * Up to
(including)
2.427
运行在以下环境
应用 kazu-yamamoto http2 * Up to
(excluding)
4.2.2
运行在以下环境
应用 konghq kong_gateway * Up to
(excluding)
3.4.2
运行在以下环境
应用 linecorp armeria * Up to
(excluding)
1.26.0
运行在以下环境
应用 linkerd linkerd * From
(including)
2.12.0
Up to
(including)
2.12.5
运行在以下环境
应用 linkerd linkerd 2.13.0 -
运行在以下环境
应用 linkerd linkerd 2.13.1 -
运行在以下环境
应用 linkerd linkerd 2.14.0 -
运行在以下环境
应用 linkerd linkerd 2.14.1 -
运行在以下环境
应用 microsoft .net * From
(including)
6.0.0
Up to
(excluding)
6.0.23
运行在以下环境
应用 microsoft .net * From
(including)
7.0.0
Up to
(excluding)
7.0.12
运行在以下环境
应用 microsoft asp.net_core * From
(including)
6.0.0
Up to
(excluding)
6.0.23
运行在以下环境
应用 microsoft asp.net_core * From
(including)
7.0.0
Up to
(excluding)
7.0.12
运行在以下环境
应用 microsoft azure_kubernetes_service * Up to
(excluding)
2023-10-08
运行在以下环境
应用 microsoft cbl-mariner * Up to
(excluding)
2023-10-11
运行在以下环境
应用 microsoft visual_studio_2022 * From
(including)
17.0
Up to
(excluding)
17.2.20
运行在以下环境
应用 microsoft visual_studio_2022 * From
(including)
17.4
Up to
(excluding)
17.4.12
运行在以下环境
应用 microsoft visual_studio_2022 * From
(including)
17.6
Up to
(excluding)
17.6.8
运行在以下环境
应用 microsoft visual_studio_2022 * From
(including)
17.7
Up to
(excluding)
17.7.5
运行在以下环境
应用 netapp astra_control_center - -
运行在以下环境
应用 netty netty * Up to
(excluding)
4.1.100
运行在以下环境
应用 nghttp2 nghttp2 * Up to
(excluding)
1.57.0
运行在以下环境
应用 nodejs node.js * From
(including)
18.0.0
Up to
(excluding)
18.18.2
运行在以下环境
应用 nodejs node.js * From
(including)
20.0.0
Up to
(excluding)
20.8.1
运行在以下环境
应用 projectcontour contour * Up to
(excluding)
2023-10-11
运行在以下环境
应用 redhat 3scale_api_management_platform 2.0 -
运行在以下环境
应用 redhat advanced_cluster_management_for_kubernetes 2.0 -
运行在以下环境
应用 redhat advanced_cluster_security 3.0 -
运行在以下环境
应用 redhat advanced_cluster_security 4.0 -
运行在以下环境
应用 redhat ansible_automation_platform 2.0 -
运行在以下环境
应用 redhat build_of_optaplanner 8.0 -
运行在以下环境
应用 redhat build_of_quarkus - -
运行在以下环境
应用 redhat ceph_storage 5.0 -
运行在以下环境
应用 redhat cert-manager_operator_for_red_hat_openshift - -
运行在以下环境
应用 redhat certification_for_red_hat_enterprise_linux 8.0 -
运行在以下环境
应用 redhat certification_for_red_hat_enterprise_linux 9.0 -
运行在以下环境
应用 redhat cost_management - -
运行在以下环境
应用 redhat cryostat 2.0 -
运行在以下环境
应用 redhat decision_manager 7.0 -
运行在以下环境
应用 redhat fence_agents_remediation_operator - -
运行在以下环境
应用 redhat integration_camel_for_spring_boot - -
运行在以下环境
应用 redhat integration_camel_k - -
运行在以下环境
应用 redhat integration_service_registry - -
运行在以下环境
应用 redhat jboss_a-mq 7 -
运行在以下环境
应用 redhat jboss_a-mq_streams - -
运行在以下环境
应用 redhat jboss_core_services - -
运行在以下环境
应用 redhat jboss_data_grid 7.0.0 -
运行在以下环境
应用 redhat jboss_enterprise_application_platform 6.0.0 -
运行在以下环境
应用 redhat jboss_enterprise_application_platform 7.0.0 -
运行在以下环境
应用 redhat jboss_fuse 6.0.0 -
运行在以下环境
应用 redhat jboss_fuse 7.0.0 -
运行在以下环境
应用 redhat logging_subsystem_for_red_hat_openshift - -
运行在以下环境
应用 redhat machine_deletion_remediation_operator - -
运行在以下环境
应用 redhat migration_toolkit_for_applications 6.0 -
运行在以下环境
应用 redhat migration_toolkit_for_containers - -
运行在以下环境
应用 redhat migration_toolkit_for_virtualization - -
运行在以下环境
应用 redhat network_observability_operator - -
运行在以下环境
应用 redhat node_healthcheck_operator - -
运行在以下环境
应用 redhat node_maintenance_operator - -
运行在以下环境
应用 redhat openshift - -
运行在以下环境
应用 redhat openshift_api_for_data_protection - -
运行在以下环境
应用 redhat openshift_container_platform 4.0 -
运行在以下环境
应用 redhat openshift_container_platform_assisted_installer - -
运行在以下环境
应用 redhat openshift_data_science - -
运行在以下环境
应用 redhat openshift_developer_tools_and_services - -
运行在以下环境
应用 redhat openshift_dev_spaces - -
运行在以下环境
应用 redhat openshift_distributed_tracing - -
运行在以下环境
应用 redhat openshift_gitops - -
运行在以下环境
应用 redhat openshift_pipelines - -
运行在以下环境
应用 redhat openshift_sandboxed_containers - -
运行在以下环境
应用 redhat openshift_secondary_scheduler_operator - -
运行在以下环境
应用 redhat openshift_serverless - -
运行在以下环境
应用 redhat openshift_service_mesh 2.0 -
运行在以下环境
应用 redhat openshift_virtualization 4 -
运行在以下环境
应用 redhat openstack_platform 16.1 -
运行在以下环境
应用 redhat openstack_platform 16.2 -
运行在以下环境
应用 redhat openstack_platform 17.1 -
运行在以下环境
应用 redhat process_automation 7.0 -
运行在以下环境
应用 redhat quay 3.0.0 -
运行在以下环境
应用 redhat run_once_duration_override_operator - -
运行在以下环境
应用 redhat satellite 6.0 -
运行在以下环境
应用 redhat self_node_remediation_operator - -
运行在以下环境
应用 redhat service_interconnect 1.0 -
运行在以下环境
应用 redhat service_telemetry_framework 1.5 -
运行在以下环境
应用 redhat single_sign-on 7.0 -
运行在以下环境
应用 redhat support_for_spring_boot - -
运行在以下环境
应用 redhat web_terminal - -
运行在以下环境
应用 traefik traefik * Up to
(excluding)
2.10.5
运行在以下环境
应用 traefik traefik 3.0.0 -
运行在以下环境
应用 varnish_cache_project varnish_cache * Up to
(excluding)
2023-10-10
运行在以下环境
系统 debian debian_linux 10.0 -
运行在以下环境
系统 debian debian_linux 11.0 -
运行在以下环境
系统 debian debian_linux 12.0 -
运行在以下环境
系统 fedoraproject fedora 37 -
运行在以下环境
系统 fedoraproject fedora 38 -
运行在以下环境
系统 microsoft windows_10_1607 * Up to
(excluding)
10.0.14393.6351
运行在以下环境
系统 microsoft windows_10_1809 * Up to
(excluding)
10.0.17763.4974
运行在以下环境
系统 microsoft windows_10_21h2 * Up to
(excluding)
10.0.19044.3570
运行在以下环境
系统 microsoft windows_10_22h2 * Up to
(excluding)
10.0.19045.3570
运行在以下环境
系统 microsoft windows_11_21h2 * Up to
(excluding)
10.0.22000.2538
运行在以下环境
系统 microsoft windows_11_22h2 * Up to
(excluding)
10.0.22621.2428
运行在以下环境
系统 microsoft windows_server_2016 - -
运行在以下环境
系统 microsoft windows_server_2019 - -
运行在以下环境
系统 microsoft windows_server_2022 - -
运行在以下环境
系统 redhat enterprise_linux 6.0 -
运行在以下环境
系统 redhat enterprise_linux 8.0 -
运行在以下环境
系统 redhat enterprise_linux 9.0 -
阿里云评分
7.5
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    全局影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    传输被破坏
  • 服务器危害
    DoS
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-400 未加控制的资源消耗(资源穷尽)
阿里云安全产品覆盖情况