Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-08651

Опубликовано: 06 мая 2022
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость пакета io.netty: netty-codec-http сетевого программного средства Netty связана с недостатками разграничений контролируемой области системы. Эксплуатация уязвимости может позволить нарушителю раскрыть защищаемую информацию

Вендор

Novell Inc.
Сообщество свободного программного обеспечения
NetApp Inc.
Red Hat Inc.
Oracle Corp.
SonarSource
Apache Software Foundation

Наименование ПО

OpenSUSE Leap
Debian GNU/Linux
OnCommand Workflow Automation
SnapCenter
OpenShift Application Runtimes
Red Hat Single Sign-On
Red Hat JBoss Fuse
Jboss Operations Network
Red Hat JBoss Data Grid
Red Hat Process Automation
Red Hat build of Quarkus
Red Hat JBoss A-MQ
Red Hat JBoss Enterprise Application Platform Expansion Pack
SUSE Linux Enterprise Server for SAP Applications
SUSE Enterprise Storage
SUSE Linux Enterprise High Performance Computing
Active IQ Unified Manager for Microsoft Windows
Red Hat OpenShift Container Platform
Suse Linux Enterprise Server
Suse Linux Enterprise Desktop
SUSE Manager Retail Branch Server
SUSE Manager Proxy
SUSE Manager Server
SUSE Linux Enterprise Module for Development Tools
Decision Manager
Oracle Financial Services Crime and Compliance Management Studio
SUSE Linux Enterprise Real Time
SUSE Linux Enterprise Module for Package Hub
Red Hat JBoss Enterprise Application Platform
Active IQ Unified Manager for Linux
SonarQube
Red Hat AMQ Streams
netty
Logging subsystem for Red Hat OpenShift
Red Hat AMQ Broker
Red Hat Data Grid
Red Hat Fuse

Версия ПО

15.5 (OpenSUSE Leap)
10 (Debian GNU/Linux)
- (OnCommand Workflow Automation)
- (SnapCenter)
- (OpenShift Application Runtimes)
7 (Red Hat Single Sign-On)
6 (Red Hat JBoss Fuse)
3.0 (Jboss Operations Network)
7 (Red Hat JBoss Data Grid)
7 (Red Hat Process Automation)
- (Red Hat build of Quarkus)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
6 (Red Hat JBoss A-MQ)
- (Red Hat JBoss Enterprise Application Platform Expansion Pack)
15.4 (OpenSUSE Leap)
15 SP3 (SUSE Linux Enterprise Server for SAP Applications)
7 (SUSE Enterprise Storage)
15 SP2 (SUSE Linux Enterprise Server for SAP Applications)
15 SP2-LTSS (SUSE Linux Enterprise High Performance Computing)
- (Active IQ Unified Manager for Microsoft Windows)
3.11 (Red Hat OpenShift Container Platform)
15 SP4 (Suse Linux Enterprise Server)
4 (Red Hat OpenShift Container Platform)
15 SP4 (Suse Linux Enterprise Desktop)
15 SP4 (SUSE Linux Enterprise Server for SAP Applications)
15 SP2-LTSS (Suse Linux Enterprise Server)
4.3 (SUSE Manager Retail Branch Server)
4.3 (SUSE Manager Proxy)
4.3 (SUSE Manager Server)
15 SP4 (SUSE Linux Enterprise High Performance Computing)
7.1 (SUSE Enterprise Storage)
15 SP4 (SUSE Linux Enterprise Module for Development Tools)
7 (Decision Manager)
8.0.8.2.0 (Oracle Financial Services Crime and Compliance Management Studio)
8.0.8.3.0 (Oracle Financial Services Crime and Compliance Management Studio)
15 SP3-LTSS (Suse Linux Enterprise Server)
15 SP3-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP3-LTSS (SUSE Linux Enterprise High Performance Computing)
15 SP3 (SUSE Linux Enterprise Real Time)
15 SP5 (SUSE Linux Enterprise Server for SAP Applications)
15 SP5 (Suse Linux Enterprise Server)
15 SP5 (Suse Linux Enterprise Desktop)
15 SP5 (SUSE Linux Enterprise High Performance Computing)
15 SP5 (SUSE Linux Enterprise Module for Development Tools)
15 SP5 (SUSE Linux Enterprise Module for Package Hub)
7 (Red Hat JBoss Enterprise Application Platform)
- (Active IQ Unified Manager for Linux)
9.3.3 (SonarQube)
6 (Red Hat JBoss Enterprise Application Platform)
7.4 for RHEL 9 (Red Hat JBoss Enterprise Application Platform)
2.5.0 (Red Hat AMQ Streams)
5 (Red Hat JBoss Enterprise Application Platform)
до 4.1.77 (netty)
- (Logging subsystem for Red Hat OpenShift)
7.10.1 (Red Hat AMQ Broker)
2.2.0 (Red Hat AMQ Streams)
8.4.0 (Red Hat Data Grid)
7.11.1 (Red Hat Fuse)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое программное средство
Сетевое средство

Операционные системы и аппаратные платформы

Novell Inc. OpenSUSE Leap 15.5
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
Novell Inc. OpenSUSE Leap 15.4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2
Novell Inc. Suse Linux Enterprise Server 15 SP4
Novell Inc. Suse Linux Enterprise Desktop 15 SP4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4
Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS
Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS
Novell Inc. SUSE Linux Enterprise Real Time 15 SP3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP5
Novell Inc. Suse Linux Enterprise Server 15 SP5
Novell Inc. Suse Linux Enterprise Desktop 15 SP5
Novell Inc. SUSE Linux Enterprise Module for Package Hub 15 SP5

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для программных продуктов NetApp Inc.:
https://security.netapp.com/advisory/ntap-20220616-0004/
Для программных продуктов Oracle Corp.:
https://www.oracle.com/security-alerts/cpujul2022.html
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-24823
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2022-24823
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2022-24823.html
Для программных продуктов SonarSource
Компенсирующие меры:
- использование антивирусных средств защиты для отслеживания попыток эксплуатации уязвимости;
- мониторинг действий пользователей;
- запуск приложений от имени пользователя с минимальными возможными привилегиями в операционной системе.

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 52%
0.00285
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 3 лет назад

Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.

CVSS3: 5.5
redhat
больше 3 лет назад

Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.

CVSS3: 5.5
nvd
больше 3 лет назад

Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.

CVSS3: 5.5
debian
больше 3 лет назад

Netty is an open-source, asynchronous event-driven network application ...

CVSS3: 5.5
github
больше 3 лет назад

Local Information Disclosure Vulnerability in io.netty:netty-codec-http

EPSS

Процентиль: 52%
0.00285
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2