You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.
Path to dependency file: /dd-java-agent/instrumentation/netty-4.1/netty-4.1.gradle
Path to vulnerable library: /caches/modules-2/files-2.1/io.netty/netty-codec-http/4.1.29.Final/454688b88cea27a4d407202d1fc79a6522345b5e/netty-codec-http-4.1.29.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec-http/4.1.29.Final/454688b88cea27a4d407202d1fc79a6522345b5e/netty-codec-http-4.1.29.Final.jar
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, when calling DefaultHttpHeadesr.set with an iterator of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the DefaultHttpHeaders.set(CharSequence, Iterator<?>) call, into a remove() call, and call add() in a loop over the iterator of values.
ℹ️ This issue was automatically closed by Mend because it is a duplicate of an existing issue: #721
mend-for-jackfan.us.kgbot
changed the title
CVE-2022-41915 (Medium) detected in netty-codec-http-4.1.29.Final.jar
CVE-2022-41915 (Medium) detected in netty-codec-http-4.1.29.Final.jar - autoclosed
Jan 4, 2023
mend-for-jackfan.us.kgbot
changed the title
CVE-2022-41915 (Medium) detected in netty-codec-http-4.1.29.Final.jar
CVE-2022-41915 (Medium) detected in netty-codec-http-4.1.29.Final.jar - autoclosed
Jan 4, 2023
CVE-2022-41915 - Medium Severity Vulnerability
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.
Library home page: http://netty.io/
Path to dependency file: /dd-java-agent/instrumentation/netty-4.1/netty-4.1.gradle
Path to vulnerable library: /caches/modules-2/files-2.1/io.netty/netty-codec-http/4.1.29.Final/454688b88cea27a4d407202d1fc79a6522345b5e/netty-codec-http-4.1.29.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec-http/4.1.29.Final/454688b88cea27a4d407202d1fc79a6522345b5e/netty-codec-http-4.1.29.Final.jar
Dependency Hierarchy:
Found in HEAD commit: 2819174635979a19573ec0ce8e3e2b63a3848079
Found in base branch: master
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, when calling
DefaultHttpHeadesr.set
with an iterator of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing theDefaultHttpHeaders.set(CharSequence, Iterator<?>)
call, into aremove()
call, and calladd()
in a loop over the iterator of values.Publish Date: 2022-12-13
URL: CVE-2022-41915
Base Score Metrics:
Type: Upgrade version
Release Date: 2022-12-13
Fix Resolution: 4.1.86.Final
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: