Lucene search

K
githubGitHub Advisory DatabaseGHSA-HH82-3PMQ-7FRP
HistoryDec 12, 2022 - 9:25 p.m.

Netty vulnerable to HTTP Response splitting from assigning header value iterator

2022-12-1221:25:44
CWE-113
CWE-436
GitHub Advisory Database
github.com
24
netty
http response splitting
http header validation

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.002

Percentile

61.0%

Impact

When calling DefaultHttpHeaders.set with an iterator of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting.

Patches

The necessary validation was added in Netty 4.1.86.Final.

Workarounds

Integrators can work around the issue by changing the DefaultHttpHeaders.set(CharSequence, Iterator<?>) call, into a remove() call, and call add() in a loop over the iterator of values.

References

HTTP Response Splitting
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
io.nettynetty-codec-httpRange4.1.83.Finalโ€“4.1.86.Final
VendorProductVersionCPE
io.nettynetty-codec-http*cpe:2.3:a:io.netty:netty-codec-http:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.002

Percentile

61.0%