io.netty:netty-transport-native-epoll@4.1.37.Final vulnerabilities

  • latest version

    4.1.116.Final

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    8 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the io.netty:netty-transport-native-epoll package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Information Disclosure

    Affected versions of this package are vulnerable to Information Disclosure via the AbstractDiskHttpData method, and on Unix-like systems.

    When netty's multipart decoders are used, local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk are enabled. On unix-like systems, the temporary directory is shared between all users. As such, writing to this directory using API's that do not explicitly set the file/directory permissions can lead to information disclosure. The method File.createTempFile on unix-like systems creates a random file, but, by default will create this file with the permissions -rw-r--r--. Sensitive information is written to this file in AbstractDiskHttpData, and other local users can read it.

    How to fix Information Disclosure?

    Upgrade io.netty:netty-transport-native-epoll to version 4.1.59.Final or higher.

    [4.0.0.Final,4.1.59.Final)