{"id":"BIT-node-min-2024-27982","details":"The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a second request within the body of the first.","aliases":["BIT-node-2024-27982","CVE-2024-27982"],"modified":"2026-03-11T07:16:59.705343Z","published":"2024-12-16T13:54:10.230Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://hackerone.com/reports/2237099"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27982"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20250418-0001/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00029.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QJAKA33NJCI3XLQS2K36DRCUMWIFFYVU/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4M5XZZONMS4DAZE3CNDFDRSB6JQCL6Y/"},{"type":"WEB","url":"https://github.com/nodejs/node/releases/tag/v18.20.1"},{"type":"WEB","url":"https://github.com/nodejs/node/releases/tag/v20.12.1"},{"type":"WEB","url":"https://github.com/nodejs/node/releases/tag/v21.7.2"}],"affected":[{"package":{"name":"node-min","ecosystem":"Bitnami","purl":"pkg:bitnami/node-min"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"18.20.1"},{"introduced":"19.0.0"},{"fixed":"20.12.1"},{"introduced":"21.0.0"},{"fixed":"21.7.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/node-min/BIT-node-min-2024-27982.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}]}],"schema_version":"1.7.5"}