Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-58056

Опубликовано: 03 сент. 2025
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.5

Описание

Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.

РелизСтатусПримечание
devel

not-affected

1:4.1.48-13
esm-apps/bionic

released

1:4.1.7-4ubuntu0.1+esm5
esm-apps/focal

released

1:4.1.45-1ubuntu0.1~esm4
esm-apps/jammy

released

1:4.1.48-4+deb11u2ubuntu0.1
esm-apps/noble

released

1:4.1.48-9ubuntu0.1
esm-apps/xenial

released

1:4.0.34-1ubuntu0.1~esm3
esm-infra-legacy/trusty

ignored

backport too intrusive
jammy

released

1:4.1.48-4+deb11u2ubuntu0.1
noble

released

1:4.1.48-9ubuntu0.1
plucky

released

1:4.1.48-10ubuntu0.25.04.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

jammy

DNE

noble

DNE

plucky

DNE

questing

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 7%
0.00027
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
5 месяцев назад

Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.

CVSS3: 7.5
nvd
5 месяцев назад

Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.

CVSS3: 7.5
debian
5 месяцев назад

Netty is an asynchronous event-driven network application framework fo ...

github
4 месяца назад

Netty vulnerable to request smuggling due to incorrect parsing of chunk extensions

CVSS3: 7.5
fstec
5 месяцев назад

Уязвимость сетевого программного средства Netty, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю осуществлять атаки с подменой HTTP-запросов

EPSS

Процентиль: 7%
0.00027
Низкий

7.5 High

CVSS3