### [CVE-2024-27983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27983) ![](https://img.shields.io/static/v1?label=Product&message=Node&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=18.20.0%3C%3D%2018.20.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Ampferl/poc_http2-continuation-flood - https://github.com/DrewskyDev/H2Flood - https://github.com/KshitijPatil08/Elevate-Task3 - https://github.com/PsychoPunkSage/Chronark - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC - https://github.com/hex0punk/cont-flood-poc - https://github.com/lirantal/CVE-2024-27983-nodejs-http2 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/vitalii-moholivskyi/selected-cve-dataset-2024