Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-43797

Опубликовано: 09 дек. 2021
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

A flaw was found in Netty, specifically in the netty-codec-http package. This flaw allows unauthorized control characters at the beginning and end of a request, does not follow the specification, and can cause HTTP request smuggling.

Отчет

In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec-http package. Since the release of OCP 4.6, the Metering product has been deprecated, hence the affected components are marked as wontfix. The openshift4/ose-logging-elasticsearch6 container is marked as Out of support scope because since the release of OCP 4.7 the logging functionality is delivered as an OpenShift Logging product and OCP 4.6 is already in the Maintenance Support phase. A fix was introduced in netty-codec-http version 4.1.72.Final.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2nettyAffected
Red Hat A-MQ OnlinenettyNot affected
Red Hat JBoss A-MQ 6nettyOut of support scope
Red Hat JBoss Data Grid 7nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 5nettyOut of support scope
Red Hat JBoss Enterprise Application Platform 6nettyOut of support scope
Red Hat JBoss Enterprise Application Platform Expansion PacknettyNot affected
Red Hat JBoss Fuse 6nettyOut of support scope
Red Hat JBoss Operations Network 3nettyOut of support scope
Red Hat OpenShift Application RuntimesnettyNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2031958netty: control chars in header names may lead to HTTP request smuggling

EPSS

Процентиль: 49%
0.00258
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 4 лет назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
nvd
около 4 лет назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
debian
около 4 лет назад

Netty is an asynchronous event-driven network application framework fo ...

suse-cvrf
больше 3 лет назад

Security update for netty3

CVSS3: 6.5
github
около 4 лет назад

HTTP request smuggling in netty

EPSS

Процентиль: 49%
0.00258
Низкий

6.5 Medium

CVSS3