HTTP/2 ‘CONTINUATION Flood’ Technique Can Be Exploited in DoS Attacks

by | Apr 5, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A revelation has surfaced concerning the HTTP/2 protocol, as newly discovered vulnerabilities dubbed “CONTINUATION Flood” pose a great threat to web servers, potentially leading to debilitating denial of service (DoS) assaults.

These vulnerabilities, identified within the HTTP/2 protocol—an update to the HTTP standard introduced in 2015—have sparked concerns among cybersecurity experts regarding the integrity and stability of online infrastructure.

The discovery of the CONTINUATION Flood vulnerabilities stems from the diligent research efforts of Barket Nowotarski, shedding light on critical flaws within the HTTP/2 implementation. Nowotarski’s findings highlight inherent weaknesses related to HTTP/2 CONTINUATION frames, which, when exploited, can trigger server outages by exploiting memory resources or causing CPU exhaustion.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

HTTP/2 messages, characterized by serialized header and trailer sections, are susceptible to fragmentation across multiple frames, with CONTINUATION frames serving as the mechanism for stitching these sections together. However, the absence of adequate frame checks in various implementations enables threat actors to launch orchestrated attacks by inundating servers with an excessive volume of frames, bypassing crucial safeguards.

Endless stream of framesEndless stream of CONTINUATION frames causing DoS (nowotarski.info)

The severity of these vulnerabilities is underscored by the issuance of several CVE IDs by the CERT Coordination Center (CERT-CC), pinpointing affected HTTP/2 implementations and outlining the diverse range of denial of service tactics enabled by the flaws.

The vulnerabilities are attributed to various CVE IDs, impacting multiple HTTP/2 implementations across different platforms and libraries. From Node.js to Apache Httpd, these vulnerabilities manifest in different forms, including memory leaks, CPU exhaustion, and improper request termination.




Despite the gravity of the situation, the implications extend beyond technical intricacies, posing significant challenges for server administrators tasked with safeguarding their infrastructure. The surreptitious nature of these attacks, compounded by the lack of visibility in access logs, exacerbates the complexity of detection and mitigation efforts, necessitating a comprehensive understanding of HTTP/2 protocols.

With major stakeholders in the internet ecosystem acknowledging the severity of the issue, including Red Hat, SUSE Linux, and the Apache HTTP Server Project, urgency surrounds the need for prompt action. As threat actors remain vigilant for opportunities to exploit these vulnerabilities, swift upgrades and heightened vigilance are imperative to fortify defenses and mitigate the looming threat of DoS attacks on internet servers.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This