Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-43848
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unititialized memory access in h2o
Source: NVD (National Vulnerability Database)
Vulnerability Description
h2o is an open source http server. In code prior to the `8c0eca3` commit h2o may attempt to access uninitialized memory. When receiving QUIC frames in certain order, HTTP/3 server-side implementation of h2o can be misguided to treat uninitialized memory as HTTP/3 frames that have been received. When h2o is used as a reverse proxy, an attacker can abuse this vulnerability to send internal state of h2o to backend servers controlled by the attacker or third party. Also, if there is an HTTP endpoint that reflects the traffic sent from the client, an attacker can use that reflector to obtain internal state of h2o. This internal state includes traffic of other connections in unencrypted form and TLS session tickets. This vulnerability exists in h2o server with HTTP/3 support, between commit 93af138 and d1f0f65. None of the released versions of h2o are affected by this vulnerability. There are no known workarounds. Users of unreleased versions of h2o using HTTP/3 are advised to upgrade immediately.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对未经初始化资源的使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
h2o 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
h2o是新一代的 HTTP 服务器。与老一代的 HTTP 服务器相比,它不仅速度非常快,而且还为最终用户提供了更快的响应。 h2o 存在安全漏洞,该漏洞源于当以特定顺序接收 QUIC 帧时,h2o 的 HTTP/3 服务器端实现可能会被误导,将未初始化的内存视为已接收的 HTTP/3 帧。当 h2o 用作反向代理时,攻击者可以利用此漏洞将 h2o 的内部状态发送到攻击者或第三方控制的后端服务器。此外,如果有一个 HTTP 端点反映从客户端发送的流量,攻击者可以使用该反射器获取 h2o 的内部状态。此内部状
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
h2oh2o Commits prior to 8c0eca3 -
II. Public POCs for CVE-2021-43848
#POC DescriptionSource LinkShenlong Link
1exploit for CVE-2021-43848https://github.com/neex/hui2ochkoPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-43848
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-43848

No comments yet


Leave a comment