5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.7%
A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
bugzilla.redhat.com/show_bug.cgi?id=2272907
gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3
github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c
github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v
nvd.nist.gov/vuln/detail/CVE-2024-29025
security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
www.cve.org/CVERecord?id=CVE-2024-29025
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.7%