GHSA-ff2w-cq2g-wv5f

Suggest an improvement
Source
https://github.com/advisories/GHSA-ff2w-cq2g-wv5f
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/02/GHSA-ff2w-cq2g-wv5f/GHSA-ff2w-cq2g-wv5f.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-ff2w-cq2g-wv5f
Aliases
Published
2020-02-21T18:55:50Z
Modified
2024-03-14T05:20:05.937087Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
HTTP Request Smuggling in Netty
Details

Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.

Database specific
{
    "nvd_published_at": "2020-01-27T17:15:00Z",
    "cwe_ids": [
        "CWE-444"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-02-20T20:54:49Z"
}
References

Affected packages

Maven / io.netty:netty-handler

Package

Name
io.netty:netty-handler
View open source insights on deps.dev
Purl
pkg:maven/io.netty/netty-handler

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.43
Fixed
4.1.45

Affected versions

4.*

4.1.43.Final
4.1.44.Final

Database specific

{
    "last_known_affected_version_range": "<= 4.1.44"
}