Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20444

Опубликовано: 29 янв. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.

Отчет

OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we're reducing the impact of this issue to moderate and may fix it in the future release. Red Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.

Меры по смягчению последствий

  • Use HTTP/2 instead (clear boundaries between requests)
  • Disable reuse of backend connections eg. http-reuse never in HAProxy or whatever equivalent LB settings

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7karaf-transaction-manager-narayanaAffected
Red Hat JBoss A-MQ 6nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 5nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 6nettyOut of support scope
Red Hat JBoss Fuse 6nettyOut of support scope
Red Hat JBoss Operations Network 3nettyOut of support scope
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-elasticsearch5Will not fix
Red Hat OpenShift Container Platform 4openshift4/ose-logging-elasticsearch5Will not fix
Red Hat Satellite 6candlepinWill not fix
AMQ Clients 2.y for RHEL 6qpid-protonFixedRHSA-2020:060125.02.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-444

EPSS

Процентиль: 88%
0.04167
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 6 лет назад

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

CVSS3: 9.1
nvd
около 6 лет назад

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

CVSS3: 9.1
debian
около 6 лет назад

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header th ...

CVSS3: 9.1
github
почти 6 лет назад

HTTP Request Smuggling in Netty

CVSS3: 9.1
fstec
около 6 лет назад

Уязвимость компонента HttpObjectDecoder.java сетевого программного средства Netty, связанная с недостатком в интерпретации HTTP-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

EPSS

Процентиль: 88%
0.04167
Низкий

7.5 High

CVSS3