Skip to content

HTTP Request Smuggling in Netty

Moderate severity GitHub Reviewed Published Feb 21, 2020 to the GitHub Advisory Database • Updated Aug 16, 2023

Package

maven io.netty:netty (Maven)

Affected versions

< 4.0.0

Patched versions

None
maven io.netty:netty-handler (Maven)
>= 4.0.0, < 4.1.45
4.1.45
maven org.jboss.netty:netty (Maven)
< 4.0.0
None

Description

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

References

Published by the National Vulnerability Database Jan 29, 2020
Reviewed Feb 20, 2020
Published to the GitHub Advisory Database Feb 21, 2020
Last updated Aug 16, 2023

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(62nd percentile)

Weaknesses

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination. Learn more on MITRE.

CVE ID

CVE-2019-20445

GHSA ID

GHSA-p2v9-g2qv-p635

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.