Логотип exploitDog
bind: "CVE-2021-21409"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2021-21409"

Количество 8

Количество 8

ubuntu логотип

CVE-2021-21409

около 4 лет назад

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-21409

около 4 лет назад

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-21409

около 4 лет назад

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2021-21409

около 4 лет назад

Netty is an open-source, asynchronous event-driven network application ...

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1315-1

около 3 лет назад

Security update for netty

EPSS: Низкий
github логотип

GHSA-f256-j965-7f32

около 4 лет назад

Possible request smuggling in HTTP/2 due missing validation of content-length

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2022-00315

больше 5 лет назад

Уязвимость сетевого программного средства Netty, связанная с недостатком в интерпретации HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.9
EPSS: Низкий
redos логотип

ROS-20220125-11

больше 3 лет назад

Уязвимость сетевого программного средства Netty

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-21409

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
5%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-21409

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
5%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-21409

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

CVSS3: 5.9
5%
Низкий
около 4 лет назад
debian логотип
CVE-2021-21409

Netty is an open-source, asynchronous event-driven network application ...

CVSS3: 5.9
5%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:1315-1

Security update for netty

5%
Низкий
около 3 лет назад
github логотип
GHSA-f256-j965-7f32

Possible request smuggling in HTTP/2 due missing validation of content-length

CVSS3: 5.9
5%
Низкий
около 4 лет назад
fstec логотип
BDU:2022-00315

Уязвимость сетевого программного средства Netty, связанная с недостатком в интерпретации HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.9
5%
Низкий
больше 5 лет назад
redos логотип
ROS-20220125-11

Уязвимость сетевого программного средства Netty

больше 3 лет назад

Уязвимостей на страницу