Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1oaDgyLTNwbXEtN2ZycM4AAwRo

Netty vulnerable to HTTP Response splitting from assigning header value iterator

Impact

When calling DefaultHttpHeaders.set with an iterator of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting.

Patches

The necessary validation was added in Netty 4.1.86.Final.

Workarounds

Integrators can work around the issue by changing the DefaultHttpHeaders.set(CharSequence, Iterator<?>) call, into a remove() call, and call add() in a loop over the iterator of values.

References

HTTP Response Splitting
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-hh82-3pmq-7frp
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oaDgyLTNwbXEtN2ZycM4AAwRo
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: over 1 year ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Identifiers: GHSA-hh82-3pmq-7frp, CVE-2022-41915
References: Repository: https://github.com/netty/netty
Blast Radius: 24.8

Affected Packages

maven:io.netty:netty-codec-http
Dependent packages: 1,324
Dependent repositories: 6,505
Downloads:
Affected Version Ranges: >= 4.1.83.Final, < 4.1.86.Final
Fixed in: 4.1.86.Final
All affected versions: 4.1.8-3.Final, 4.1.8-4.Final, 4.1.8-5.Final
All unaffected versions: