io.netty:netty-codec-http2@4.1.50.Final vulnerabilities

  • latest version

    4.1.116.Final

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    9 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the io.netty:netty-codec-http2 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Denial of Service (DoS) in the implementation of the HTTP/2 protocol. An attacker can cause a denial of service (including via DDoS) by rapidly resetting many streams through request cancellation.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.100.Final or higher.

    [,4.1.100.Final)
    • M
    HTTP Request Smuggling

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to HTTP Request Smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a follow-up of CVE-2021-21295 which did not fix this specific case.

    How to fix HTTP Request Smuggling?

    Upgrade io.netty:netty-codec-http2 to version 4.1.61.Final or higher.

    [,4.1.61.Final)
    • M
    HTTP Request Smuggling

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to HTTP Request Smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by Http2MultiplexHandler as it is propagated up.

    An additional case of this vulnerability was fixed in 4.1.61.Final (CVE-2021-21409).

    How to fix HTTP Request Smuggling?

    Upgrade io.netty:netty-codec-http2 to version 4.1.60.Final or higher.

    [,4.1.60.Final)