Security

Two first-gen flaws carried over to HTTP/2, warn security bods

Quartet of weaknesses include ancient vuln from 2009

By John Leyden

8 SHARE

Black Hat Security researchers have unearthed four high-profile vulnerabilities in HTTP/2, a new version of the protocol.

HTTP/2 introduces new mechanisms that effectively increase the attack surface of business critical web infrastructure, according to a study by researchers at data centre security vendor Imperva and released at the Black Hat conference on Wednesday.

Imperva’s researchers took an in-depth look at HTTP/2 server implementations from Apache, Microsoft, NGINX, Jetty, and nghttp2.

The team discovered exploitable vulnerabilities in all major HTTP/2 implementations that it reviewed, including two that are similar to well-known and widely exploited vulnerabilities in HTTP/1.x.

The quartet of HTTP/2 attack vectors include:

“The general web performance improvements and specific enhancements for mobile applications introduced in HTTP/2 are a potential boon for internet users,” said Amichai Shulman, co-founder and CTO of Imperva. “However, releasing a large amount of new code into the wild in a short time creates an excellent opportunity for attackers. While it is disturbing to see known HTTP 1.x threats introduced in HTTP/2, it’s hardly surprising. As with all new technology, it is important for businesses to perform due diligence and implement safeguards to harden the extended attack surface and protect critical business and consumer data from ever-evolving cyber threats.”

HTTP/2 adoption is picking up pace. According to W3Techs, 8.7 per cent of all websites, approximately 85 million sites, use HTTP/2, an almost fourfold increase from just 2.3 per cent in December 2015.

Implementing a web application firewall (WAF) with virtual patching capabilities can help enterprises to protect their critical data and applications from cyber attack while introducing HTTP/2, according to Imperva ( leading supplier of WAF technology).

More details of Imperva’s research are here (pdf) (infographic here). ®

Sign up to our NewsletterGet IT in your inbox daily

8 Comments

More from The Register

Insane in the domain: Sea Turtle hackers pwn DNS orgs to dash web surfers on the rocks of phishing pages

Website settings altered to point visitors to malicious clones

Dear hackers: If you try to pwn a website for phishing, make sure it's not the personal domain of a senior Akamai security researcher

Exclusive Crooks fail to hijack infosec bloke's site to dress it up as a legit Euro bank login page

Amazon Web Services ships own open-source flavor of Elasticsearch, insists it's not trying to fork developers off

This is not a split, says rent-a-server biz

F5 Networks buys into open source, hands over $670m for Nginx! Double Nginx! Infinity Nginx!

Yep, over half a bill for second most-popular web server

Getting the F... acebook out of Kea: Zuck's open-sourcerers retrain load balancer as a server

Replaces industry standard with homegrown DHCPLB code

Crime doesn't pay? Crime doesn't do secure coding, either: Akamai bug-hunters find hijack hole in bank phishing kit

Exclusive Absolutely criminal behavior – unrestricted file upload, really?

Hitting Microsoft's metal: SUSE flings Enterprise Linux at SAP HANA on Azure

SUSECON '19 Fancy a slice of SLES for SAP?

Wondering how to whack Zoom's dodgy hidden web server on your Mac? No worries, Apple's done it for you

iGiant acts to protect users

Make a SAP decision: Apply these security fixes if you're using German giant's software

11 patches ship on Patch Tuesday

It's alive! Big Switch stitches together an open-source Network Operating System

Victor Frankenstein would be impressed