Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-9622

Опубликовано: 08 окт. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 5.3

Описание

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

РелизСтатусПримечание
devel

needed

esm-apps/focal

released

3.6.2-2ubuntu0.20.04.1~esm1
esm-apps/jammy

released

3.6.2-2ubuntu0.22.04.1~esm1
esm-apps/noble

released

3.6.2-2ubuntu0.24.04.1~esm1
esm-apps/xenial

released

3.0.6-3ubuntu0.1~esm1
focal

ignored

end of standard support, was needed
jammy

needed

noble

needed

oracular

released

3.6.2-2ubuntu0.24.10.1
plucky

released

3.6.2-3ubuntu0.25.04.1

Показывать по

РелизСтатусПримечание
devel

needed

esm-apps/bionic

released

3.0.26-1~18.04.1~esm1
esm-apps/focal

released

3.0.26-1ubuntu0.1~esm1
esm-apps/jammy

released

3.0.26-3ubuntu0.1
esm-apps/noble

released

3.0.26-6ubuntu0.24.04.1
focal

ignored

end of standard support, was needed
jammy

released

3.0.26-3ubuntu0.1
noble

released

3.0.26-6ubuntu0.24.04.1
oracular

released

3.0.26-6ubuntu0.24.10.1
plucky

released

3.0.26-6ubuntu0.25.04.1

Показывать по

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
около 1 года назад

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

CVSS3: 5.3
nvd
около 1 года назад

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

CVSS3: 5.3
github
около 1 года назад

HTTP Request Smuggling Leading to Client Timeouts in resteasy-netty4

CVSS3: 5.3
fstec
около 1 года назад

Уязвимость декодера HttpObjectDecoder программного средства RESTEasy, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

5.3 Medium

CVSS3