CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
Low
EPSS
Percentile
15.5%
Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers &
clients. The HttpPostRequestDecoder
can be tricked to accumulate data.
While the decoder can store items on the disk if configured so, there are
no limits to the number of fields the form can have, an attacher can send a
chunked post consisting of many small fields that will be accumulated in
the bodyListHttpData
list. The decoder cumulates bytes in the
undecodedChunk
buffer until it can decode a field, this field can
cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.
gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3
github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c
github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c (netty-4.1.108.Final)
github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v
launchpad.net/bugs/cve/CVE-2024-29025
nvd.nist.gov/vuln/detail/CVE-2024-29025
security-tracker.debian.org/tracker/CVE-2024-29025
www.cve.org/CVERecord?id=CVE-2024-29025