Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f256-j965-7f32

Опубликовано: 30 мар. 2021
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Possible request smuggling in HTTP/2 due missing validation of content-length

Impact

The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1

This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.

Patches

This was fixed as part of 4.1.61.Final

Workarounds

Validation can be done by the user before proxy the request by validating the header.

Ссылки

Пакеты

Наименование

io.netty:netty-codec-http2

maven
Затронутые версииВерсия исправления

>= 4.0.0, < 4.1.61.Final

4.1.61.Final

Наименование

org.jboss.netty:netty

maven
Затронутые версииВерсия исправления

Отсутствует

Наименование

io.netty:netty

maven
Затронутые версииВерсия исправления

Отсутствует

EPSS

Процентиль: 89%
0.05113
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 4 лет назад

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
redhat
около 4 лет назад

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
nvd
около 4 лет назад

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
debian
около 4 лет назад

Netty is an open-source, asynchronous event-driven network application ...

suse-cvrf
около 3 лет назад

Security update for netty

EPSS

Процентиль: 89%
0.05113
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-444