Логотип exploitDog
bind:CVE-2021-43797
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-43797

Количество 8

Количество 8

ubuntu логотип

CVE-2021-43797

около 4 лет назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2021-43797

около 4 лет назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-43797

около 4 лет назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2021-43797

около 4 лет назад

Netty is an asynchronous event-driven network application framework fo ...

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2047-1

больше 3 лет назад

Security update for netty3

EPSS: Низкий
github логотип

GHSA-wx5j-54mm-rqqq

около 4 лет назад

HTTP request smuggling in netty

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-08648

около 4 лет назад

Уязвимость сетевого программного средства Netty, связанная с некорректной обработкой управляющих символов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1271-1

почти 4 года назад

Security update for netty

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-43797

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-43797

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-43797

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CVSS3: 6.5
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-43797

Netty is an asynchronous event-driven network application framework fo ...

CVSS3: 6.5
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:2047-1

Security update for netty3

0%
Низкий
больше 3 лет назад
github логотип
GHSA-wx5j-54mm-rqqq

HTTP request smuggling in netty

CVSS3: 6.5
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2023-08648

Уязвимость сетевого программного средства Netty, связанная с некорректной обработкой управляющих символов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 6.5
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:1271-1

Security update for netty

почти 4 года назад

Уязвимостей на страницу