4.2.12.Final
13 years ago
1 months ago
Known vulnerabilities in the io.netty:netty-codec-http package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to HTTP Request Smuggling in the Note: This is only exploitable if the deployment is behind a reverse proxy or load balancer that prioritizes the How to fix HTTP Request Smuggling? Upgrade | [,4.1.133.Final)[4.2.0.Alpha1,4.2.13.Final) |
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to HTTP Request Smuggling via the How to fix HTTP Request Smuggling? Upgrade | [,4.1.133.Final)[4.2.0.Alpha1,4.2.13.Final) |
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to HTTP Request Smuggling in the Note: This is only exploitable if HTTP/1.1 pipelining is used, a HEAD request is present in the pipeline, and the server sends 1xx responses. How to fix HTTP Request Smuggling? Upgrade | [,4.1.133.Final)[4.2.0.Alpha1,4.2.13.Final) |
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to HTTP Request Smuggling when parsed HTTP requests contain malformed How to fix HTTP Request Smuggling? Upgrade | [,4.1.133.Final)[4.2.0.Alpha1,4.2.13.Final) |
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to HTTP Request Smuggling in the Note: This is only exploitable if all of the following conditions are met:
How to fix HTTP Request Smuggling? Upgrade | [,4.1.133.Final)[4.2.0.Alpha1,4.2.13.Final) |
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to HTTP Request Smuggling in the parsing of quoted strings within chunked transfer encoding extension values. An attacker can inject arbitrary HTTP requests into a connection by crafting chunk extensions containing carriage return or line feed bytes, leading to parsing discrepancies between the server and RFC-compliant intermediaries. How to fix HTTP Request Smuggling? Upgrade | [,4.1.132.Final)[4.2.0.Alpha1,4.2.12.Final) |
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients. Affected versions of this package are vulnerable to CRLF Injection in How to fix CRLF Injection? Upgrade | [,4.1.129.Final)[4.2.0.Alpha1,4.2.8.Final) |