Vulnerability Details : CVE-2023-30847
H2O is an HTTP server. In versions 2.3.0-beta2 and prior, when the reverse proxy handler tries to processes a certain type of invalid HTTP request, it tries to build an upstream URL by reading from uninitialized pointer. This behavior can lead to crashes or leak of information to back end HTTP servers. Pull request number 3229 fixes the issue. The pull request has been merged to the `master` branch in commit f010336. Users should upgrade to commit f010336 or later.
Products affected by CVE-2023-30847
- cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*
- cpe:2.3:a:dena:h2o:2.3.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:dena:h2o:2.3.0:beta2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-30847
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-30847
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
3.9
|
4.2
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
3.9
|
4.2
|
GitHub, Inc. |
CWE ids for CVE-2023-30847
-
The product accesses or uses a pointer that has not been initialized.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-30847
-
https://github.com/h2o/h2o/security/advisories/GHSA-p5hj-phwj-hrvx
invalid memory read in proxy handler · Advisory · h2o/h2o · GitHubPatch;Vendor Advisory
-
https://github.com/h2o/h2o/commit/f010336bab162839df43d9e87570897466c97e33
Merge pull request #3229 from h2o/kazuho/reverse-proxy-invalid-read · h2o/h2o@f010336 · GitHubPatch
-
https://github.com/h2o/h2o/pull/3229
[reverse proxy] invalid memory read by kazuho · Pull Request #3229 · h2o/h2o · GitHubVendor Advisory
Jump to