{"id":25577,"date":"2019-02-21T11:59:42","date_gmt":"2019-02-21T11:59:42","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/"},"modified":"2019-02-21T11:59:42","modified_gmt":"2019-02-21T11:59:42","slug":"welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/","title":{"rendered":"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft&#8217;s IIS into a spin"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/02\/21\/shutterstock_patch_blue.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Updated<\/strong> Oops! Microsoft has published an advisory on a bug in its Internet Information Services (IIS) product that allows a malicious HTTP\/2 request to send CPU usage to 100 per cent.<\/p>\n<p>An anonymous <em>Reg<\/em> reader tipped us off to the advisory, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190005\">ADV190005<\/a>, which warns that the condition can leave the system CPU usage pinned to the ceiling until IIS kills the connection.<\/p>\n<p>In other words, a Denial Of Service (DOS).<\/p>\n<p>HTTP\/2 is a major update to the venerable HTTP protocol used by the World Wide Web and is geared toward improving performance, among other changes. Windows Server 2016 was the first Microsoft server product to support it, and Windows 10 (versions 1607 \u2013 1803) is affected by the issue.<\/p>\n<p>The problem, according to Microsoft, is that the HTTP\/2 spec allows a client to specify any number of SETTINGS frames with any number of SETTINGS parameters. Those parameters usually include helpful stuff like the characteristics of the sending peer, and different values for the same parameter can be advertised by each peer.<\/p>\n<p>Excessive settings can make things go a bit wobbly as IIS works on the request and sends the CPU usage sky high until a connection timeout is reached and the connection closed.<\/p>\n<p>The good news is that this week&#8217;s &#8220;non-security update&#8221; deals with the problem. Microsoft flung out patches on 19 February in the form of <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4487006\/windows-10-update-kb4487006\">KB4487006<\/a>, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4487011\/windows-10-update-kb4487011\">KB4487011<\/a>, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4487021\/windows-10-update-kb4487021\">KB4487021<\/a> and <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4487029\/windows-10-update-kb4487029\">KB4487029<\/a> to deal with it.<\/p>\n<p>The company has added the ability to set thresholds on the number of HTTP\/2 SETTINGS in a request but has declined to set any defaults, leaving it to the IIS Admin to configure.<\/p>\n<p>This is assuming that administrators can actually find the setting. The link for the Knowledge Base article (<a target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4491420\">KB4491420<\/a>) that Microsoft <a target=\"_blank\" href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190005\">suggested<\/a> users review went nowhere at the time of writing, and the current documentation for IIS cheerfully tells admins that there are no new configuration settings specific to HTTP\/2.<\/p>\n<p>We&#8217;ve contacted Microsoft to learn more and will update with any response.<\/p>\n<p>The issue itself was discovered by Gal Goldshtein of F5 Networks. \u00ae<\/p>\n<h3 class=\"crosshead\"><span>Updated to add at 15:13 UTC<\/span><\/h3>\n<p>After we brought the broken link to its attention, <a target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4491420\/define-thresholds-on-the-number-of-http-2-settings-parameters-exchange\">Microsoft posted<\/a> the support article detailing defining those pesky thresholds.<\/p>\n<p>Alas, there is no cosy GUI for admins. You&#8217;ll need to edit a couple of registry entries and reboot to see the thresholds applied. As promised, Microsoft is not about to define any presets for the values. It&#8217;s up to the admin to decide.<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7146\/top-5-threat-hunting-myths?td=wptl1810\">Top 5 Threat Hunting Myths<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/02\/21\/http2_iis_microsoft\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s patching time again for Windows Server 2016 and Windows 10 Updated\u00a0 Oops! Microsoft has published an advisory on a bug in its Internet Information Services (IIS) product that allows a malicious HTTP\/2 request to send CPU usage to 100 per cent.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25578,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft&#039;s IIS into a spin 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft&#039;s IIS into a spin 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-21T11:59:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Welcome to the sunlit uplands of HTTP\\\/2, where a naughty request can send Microsoft&#8217;s IIS into a spin\",\"datePublished\":\"2019-02-21T11:59:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/\"},\"wordCount\":433,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/\",\"name\":\"Welcome to the sunlit uplands of HTTP\\\/2, where a naughty request can send Microsoft's IIS into a spin 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg\",\"datePublished\":\"2019-02-21T11:59:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Welcome to the sunlit uplands of HTTP\\\/2, where a naughty request can send Microsoft&#8217;s IIS into a spin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft's IIS into a spin 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/","og_locale":"en_US","og_type":"article","og_title":"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft's IIS into a spin 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-21T11:59:42+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft&#8217;s IIS into a spin","datePublished":"2019-02-21T11:59:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/"},"wordCount":433,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/","url":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/","name":"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft's IIS into a spin 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg","datePublished":"2019-02-21T11:59:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/welcome-to-the-sunlit-uplands-of-http-2-where-a-naughty-request-can-send-microsofts-iis-into-a-spin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Welcome to the sunlit uplands of HTTP\/2, where a naughty request can send Microsoft&#8217;s IIS into a spin"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25577"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25577\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25578"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}