6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
32.9%
netty-codec-http is vulnerable to HTTP response splitting attack. The vulnerability exists in the setObject
function of DefaultHeaders.java
as it takes the arrays and iterators as arguments, providing a way to bypass value validation allowing an attacker to inject malicious header values into the iterator.
CPE | Name | Operator | Version |
---|---|---|---|
netty/codec/http | le | 4.1.85.Final | |
netty/codec/http2 | le | 4.1.85.Final | |
netty/codec/http | le | 4.1.85.Final | |
netty/codec/http2 | le | 4.1.85.Final |
github.com/advisories/GHSA-hh82-3pmq-7frp
github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4
github.com/netty/netty/issues/13084
github.com/netty/netty/pull/12760
github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp
lists.debian.org/debian-lts-announce/2023/01/msg00008.html
security.netapp.com/advisory/ntap-20230113-0004/
www.debian.org/security/2023/dsa-5316
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
32.9%