CVE-2024-33452

NameCVE-2024-33452
DescriptionAn issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnginx-mod-http-lua (PTS)bookworm1:0.10.23-1vulnerable
sid, trixie1:0.10.28-2fixed
nginx (PTS)bullseye1.18.0-6.1+deb11u3vulnerable
bullseye (security)1.18.0-6.1+deb11u4vulnerable
bookworm1.22.1-9+deb12u1fixed
sid, trixie1.26.3-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnginx-mod-http-luasource(unstable)1:0.10.27-1
nginxsource(unstable)1.22.0-3

Notes

src:nginx/1.22.0-3 removed the http-lua module and moved it to a separate package
https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
https://www.benasin.space/2025/03/18/OpenResty-lua-nginx-module-v0-10-26-HTTP-Request-Smuggling-in-HEAD-requests/
https://github.com/openresty/lua-nginx-module/commit/e5248aa8203d3e0075822a577c1cdd19f5f1f831 (v0.10.27rc1)

Search for package or bug name: Reporting problems