vulnerability
Arch Linux: Insufficient validation (CVE-2024-27982)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:N/I:P/A:P) | May 7, 2024 | Jul 11, 2025 | Nov 27, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Published
May 7, 2024
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The team has identified a vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a second request within the body of the first.
Impacts: This vulnerability affects all users in all active release lines: 18.x, 20.x and, 21.x.
Impacts: This vulnerability affects all users in all active release lines: 18.x, 20.x and, 21.x.
Solution
arch-linux-upgrade-latest
References
- CVE-2024-27982
- https://attackerkb.com/topics/CVE-2024-27982
- URL-https://github.com/nodejs/node/releases/tag/v18.20.1
- URL-https://github.com/nodejs/node/releases/tag/v20.12.1
- URL-https://github.com/nodejs/node/releases/tag/v21.7.2
- URL-https://hackerone.com/reports/2237099
- URL-https://nodejs.org/en/blog/vulnerability/april-2024-security-releases/
- CWE-444
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.