CVE-2024-10550

A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.
References
Link Resource
https://huntr.com/bounties/ef3f4d89-3b8b-4618-b134-cb93c1664ec6 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:h2o:h2o:3.46.0.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-20 10:15

Updated : 2025-07-14 13:49


NVD link : CVE-2024-10550

Mitre link : CVE-2024-10550

CVE.ORG link : CVE-2024-10550


JSON object : View

Products Affected

h2o

  • h2o
CWE
CWE-1333

Inefficient Regular Expression Complexity