Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
|
|
Netty
Subscribe
|
Netty
Subscribe
|
|
Oracle
Subscribe
|
Banking Deposits And Lines Of Credit Servicing
Subscribe
Banking Party Management
Subscribe
Banking Platform
Subscribe
Coherence
Subscribe
Communications Cloud Native Core Binding Support Function
Subscribe
Communications Cloud Native Core Network Slice Selection Function
Subscribe
Communications Cloud Native Core Policy
Subscribe
Communications Cloud Native Core Security Edge Protection Proxy
Subscribe
Communications Cloud Native Core Unified Data Repository
Subscribe
Communications Design Studio
Subscribe
Communications Instant Messaging Server
Subscribe
Helidon
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
|
|
Quarkus
Subscribe
|
Quarkus
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3268-1 | netty security update |
Debian DSA |
DSA-5316-1 | netty security update |
EUVD |
EUVD-2021-2607 | Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final. |
Github GHSA |
GHSA-wx5j-54mm-rqqq | HTTP request smuggling in netty |
Ubuntu USN |
USN-6049-1 | Netty vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T04:03:08.898Z
Reserved: 2021-11-16T00:00:00
Link: CVE-2021-43797
No data.
Status : Modified
Published: 2021-12-09T19:15:07.960
Modified: 2024-11-21T06:29:48.490
Link: CVE-2021-43797
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN