Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hh82-3pmq-7frp

Опубликовано: 12 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Netty vulnerable to HTTP Response splitting from assigning header value iterator

Impact

When calling DefaultHttpHeaders.set with an iterator of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting.

Patches

The necessary validation was added in Netty 4.1.86.Final.

Workarounds

Integrators can work around the issue by changing the DefaultHttpHeaders.set(CharSequence, Iterator<?>) call, into a remove() call, and call add() in a loop over the iterator of values.

References

HTTP Response Splitting CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

io.netty:netty-codec-http

maven
Затронутые версииВерсия исправления

>= 4.1.83.Final, < 4.1.86.Final

4.1.86.Final

EPSS

Процентиль: 40%
0.0018
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-113
CWE-436

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.

CVSS3: 6.5
nvd
больше 2 лет назад

Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.

CVSS3: 6.5
debian
больше 2 лет назад

Netty project is an event-driven asynchronous network application fram ...

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость сетевого программного средства Netty, связанная с возникновением конфликта интерпретаций, позволяющая нарушителю раскрыть и модифицировать защищаемую информацию

suse-cvrf
около 2 лет назад

Security update for netty, netty-tcnative

EPSS

Процентиль: 40%
0.0018
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-113
CWE-436