Miggo Logo

CVE-2024-24990: When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed requests...

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.41154%
Published
2/14/2024
Updated
6/10/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis started by fetching content from the provided URLs. The F5 advisory link was not functional. The oss-security mailing list provided crucial information, pinpointing the vulnerability to the ngx_http_v3_module in Nginx versions 1.25.0 - 1.25.3, with a fix in 1.25.4. Since direct commit URLs were unavailable, repository tags were fetched for nginx/nginx. The commits between 'release-1.25.3' (last vulnerable) and 'release-1.25.4' (first fixed) were compared. Two specific commits, 5818f8a6693b3c0d95021f2ee58b69dcf848911c and 5902baf680609f884a1e11ff2b82a0bffb3724cc, were identified as directly addressing issues within the QUIC implementation that align with the vulnerability description (worker process crash, use-after-free). The commit messages and diffs for these commits confirmed that ngx_quic_stream_cleanup_handler and ngx_quic_decrypt were modified to fix use-after-free and segfault issues, respectively. These functions are therefore identified as the vulnerable functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W**n N*INX Plus or N*INX OSS *r* *on*i*ur** to us* t** *TTP/* QUI* mo*ul*, un*is*los** r*qu*sts **n **us* N*INX work*r pro**ss*s to t*rmin*t*. Not*: T** *TTP/* QUI* mo*ul* is not *n**l** *y ****ult *n* is *onsi**r** *xp*rim*nt*l. *or mor* in*orm*ti

Reasoning

T** *n*lysis st*rt** *y **t**in* *ont*nt *rom t** provi*** URLs. T** ** **visory link w*s not *un*tion*l. T** oss-s**urity m*ilin* list provi*** *ru*i*l in*orm*tion, pinpointin* t** vuln*r**ility to t** n*x_*ttp_v*_mo*ul* in N*inx v*rsions *.**.* - *