CVE-2024-24806Server-Side Request Forgery in Libuv

Severity
7.3HIGHNVD
EPSS
0.2%
top 59.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 7
Latest updateNov 14

Description

libuv is a multi-platform support library with a focus on asynchronous I/O. The `uv_getaddrinfo` function in `src/unix/getaddrinfo.c` (and its windows counterpart `src/win/getaddrinfo.c`), truncates hostnames to 256 characters before calling `getaddrinfo`. This behavior can be exploited to create addresses like `0x00007f000001`, which are considered valid by `getaddrinfo` and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulner

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4

Affected Packages19 packages

NVDlibuv/libuv1.24.01.48.0
debiandebian/libuv1< libuv1 1.44.2-1+deb12u1 (bookworm)
CVEListV5libuv/libuv>= 1.45.0, < 1.48.0

Patches

🔴Vulnerability Details

1
OSV
CVE-2024-24806: libuv is a multi-platform support library with a focus on asynchronous I/O2024-02-07

📋Vendor Advisories

6
CISA ICS
Siemens SINEC INS2024-11-14
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2024-248062024-05-13
Ubuntu
libuv vulnerability2024-02-28
Microsoft
Improper Domain Lookup that potentially leads to SSRF attacks in libuv2024-02-13
Red Hat
libuv: Improper Domain Lookup that potentially leads to SSRF attacks2024-02-07

💬Community

1
HackerOne
Libuv: Improper Domain Lookup that potentially leads to SSRF attacks2024-03-29
CVE-2024-24806 — Server-Side Request Forgery in Libuv | cvebase