CVE-2021-43797 — HTTP Request Smuggling in Netty
Severity
6.5MEDIUMNVD
EPSS
0.4%
top 40.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Latest updateApr 28
Description
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote syste…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages17 packages
Also affects: Debian Linux 10.0, 11.0
Patches
🔴Vulnerability Details
4OSV▶
CVE-2021-43797: Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients↗2021-12-09
CVEList▶
HTTP fails to validate against control chars in header names which may lead to HTTP request smuggling↗2021-12-09
📋Vendor Advisories
6Oracle
▶
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: PSR Designer (Netty) — CVE-2021-43797↗2022-07-15
Oracle
▶