Описание
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.
Отчет
OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we're reducing the impact of this issue to moderate and may fix it in the future release. Red Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this. [1] https://github.com/elastic/elasticsearch/issues/49396
Меры по смягчению последствий
- Use HTTP/2 instead (clear boundaries between requests)
- Disable reuse of backend connections eg.
http-reuse neverin HAProxy or whatever equivalent LB settings
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat JBoss A-MQ 6 | netty | Out of support scope | ||
| Red Hat JBoss Enterprise Application Platform 5 | netty | Out of support scope | ||
| Red Hat JBoss Enterprise Application Platform 6 | netty | Out of support scope | ||
| Red Hat JBoss Fuse 6 | netty | Out of support scope | ||
| Red Hat JBoss Operations Network 3 | netty | Out of support scope | ||
| Red Hat OpenShift Container Platform 3.11 | openshift3/ose-logging-elasticsearch5 | Will not fix | ||
| Red Hat OpenShift Container Platform 4 | openshift4/ose-logging-elasticsearch5 | Will not fix | ||
| Red Hat Satellite 6 | candlepin | Will not fix | ||
| AMQ Clients 2.y for RHEL 6 | qpid-proton | Fixed | RHSA-2020:0601 | 25.02.2020 |
| AMQ Clients 2.y for RHEL 7 | qpid-proton | Fixed | RHSA-2020:0601 | 25.02.2020 |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length ...
Уязвимость компонента HttpObjectDecoder.java сетевого программного средства Netty, связанная с недостатком в интерпретации HTTP-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
7.5 High
CVSS3