Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWYyNTYtajk2NS03ZjMy

Possible request smuggling in HTTP/2 due missing validation of content-length

Impact

The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1

This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.

Patches

This was fixed as part of 4.1.61.Final

Workarounds

Validation can be done by the user before proxy the request by validating the header.

Permalink: https://github.com/advisories/GHSA-f256-j965-7f32
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWYyNTYtajk2NS03ZjMy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: 9 months ago


CVSS Score: 5.9
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Identifiers: GHSA-f256-j965-7f32, CVE-2021-21409
References: Repository: https://github.com/netty/netty
Blast Radius: 24.6

Affected Packages

maven:io.netty:netty
Dependent packages: 1,133
Dependent repositories: 14,650
Downloads:
Affected Version Ranges: < 4.0.0
No known fixed version
All affected versions:
maven:org.jboss.netty:netty
Dependent packages: 324
Dependent repositories: 1,820
Downloads:
Affected Version Ranges: < 4.0.0
No known fixed version
All affected versions:
maven:io.netty:netty-codec-http2
Dependent packages: 556
Dependent repositories: 1,457
Downloads:
Affected Version Ranges: >= 4.0.0, < 4.1.61.Final
Fixed in: 4.1.61.Final
All affected versions: 4.1.6-0.Final
All unaffected versions: