Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20445

Опубликовано: 29 янв. 2020
Источник: redhat
CVSS3: 7.5

Описание

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.

Отчет

OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we're reducing the impact of this issue to moderate and may fix it in the future release. Red Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this. [1] https://github.com/elastic/elasticsearch/issues/49396

Меры по смягчению последствий

  • Use HTTP/2 instead (clear boundaries between requests)
  • Disable reuse of backend connections eg. http-reuse never in HAProxy or whatever equivalent LB settings

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss A-MQ 6nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 5nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 6nettyOut of support scope
Red Hat JBoss Fuse 6nettyOut of support scope
Red Hat JBoss Operations Network 3nettyOut of support scope
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-elasticsearch5Will not fix
Red Hat OpenShift Container Platform 4openshift4/ose-logging-elasticsearch5Will not fix
Red Hat Satellite 6candlepinWill not fix
AMQ Clients 2.y for RHEL 6qpid-protonFixedRHSA-2020:060125.02.2020
AMQ Clients 2.y for RHEL 7qpid-protonFixedRHSA-2020:060125.02.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1798509netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 6 лет назад

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

CVSS3: 9.1
nvd
около 6 лет назад

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

CVSS3: 9.1
debian
около 6 лет назад

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length ...

github
почти 6 лет назад

HTTP Request Smuggling in Netty

CVSS3: 9.1
fstec
около 6 лет назад

Уязвимость компонента HttpObjectDecoder.java сетевого программного средства Netty, связанная с недостатком в интерпретации HTTP-запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

7.5 High

CVSS3