CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
Low
EPSS
Percentile
15.5%
The HttpPostRequestDecoder
can be tricked to accumulate data. I have spotted currently two attack vectors
bodyListHttpData
list.undecodedChunk
buffer until it can decode a field, this field can cumulate data without limitsHere is a Netty branch that provides a fix + tests : https://github.com/vietj/netty/tree/post-request-decoder
Here is a reproducer with Vert.x (which uses this decoder) https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3
Any Netty based HTTP server that uses the HttpPostRequestDecoder
to decode a form.
Vendor | Product | Version | CPE |
---|---|---|---|
io.netty | netty-codec-http | * | cpe:2.3:a:io.netty:netty-codec-http:*:*:*:*:*:*:*:* |
gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3
github.com/advisories/GHSA-5jpm-x58v-624v
github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c
github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v
github.com/vietj/netty/tree/post-request-decoder
lists.debian.org/debian-lts-announce/2024/06/msg00015.html
nvd.nist.gov/vuln/detail/CVE-2024-29025