GHSA-4W98-XF39-23GP: Infinite Loop Denial of Service in ewe HTTP Trailer Parsing
Vulnerability ID: GHSA-4W98-XF39-23GP
CVSS Score: 7.5
Published: 2026-03-16
The ewe web server, developed in Gleam for the Erlang BEAM ecosystem, contains a Denial of Service vulnerability stemming from an infinite loop in its HTTP trailer parsing logic. Versions prior to 3.0.3 fail to properly advance the network buffer when encountering invalid or forbidden chunked trailers. This flaw allows an unauthenticated remote attacker to trigger 100% CPU exhaustion by sending a maliciously crafted HTTP/1.1 request.
TL;DR
Infinite loop in ewe's HTTP trailer parser allows unauthenticated remote attackers to cause a complete Denial of Service (DoS) via crafted chunked requests.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-835
- Attack Vector: Network
- CVSS Score: 7.5
- Impact: High (Denial of Service)
- Exploit Status: Proof of Concept Available
- Authentication Required: None
Affected Systems
- ewe web server (< 3.0.3)
-
ewe: < 3.0.3 (Fixed in:
3.0.3)
Code Analysis
Commit: d8b9b8a
Primary fix: Advances buffer offset to header_rest in error paths within handle_trailers
Commit: 8513de9
Refactor: Introduces Buffer abstraction to manage parsing state
Mitigation Strategies
- Upgrade the ewe package to version 3.0.3 or higher.
- Implement WAF rules to drop HTTP/1.1 chunked requests containing restricted trailer headers.
- Configure reverse proxies to strip HTTP trailers before forwarding requests to the ewe backend.
- Downgrade incoming HTTP/1.1 traffic to HTTP/1.0 at the load balancer to eliminate chunked transfer encoding support entirely.
Remediation Steps:
- Identify all Gleam projects utilizing the ewe package.
- Update the ewe dependency version in gleam.toml to >= 3.0.3.
- Run the Gleam package manager command to fetch the updated dependency.
- Recompile the application and deploy the updated binaries to production environments.
References
Read the full report for GHSA-4W98-XF39-23GP on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)