CVE-2024-39702

In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*

History

06 Jun 2025, 20:28

Type Values Removed Values Added
References () https://openresty.org/en/ann-1025003002.html - () https://openresty.org/en/ann-1025003002.html - Patch
CPE cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*
First Time Openresty
Openresty openresty

Information

Published : 2024-07-23 16:15

Updated : 2025-06-06 20:28


NVD link : CVE-2024-39702

Mitre link : CVE-2024-39702

CVE.ORG link : CVE-2024-39702


JSON object : View

Products Affected

openresty

  • openresty
CWE
CWE-407

Inefficient Algorithmic Complexity