io.projectreactor.netty:reactor-netty-http@1.0.23 vulnerabilities

  • latest version

    1.2.0

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the io.projectreactor.netty:reactor-netty-http package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

    Affected versions of this package are vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') when it is configured to serve static resources. An attacker can gain unauthorized access to directories and files by sending a specially crafted URL.

    How to fix Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')?

    Upgrade io.projectreactor.netty:reactor-netty-http to version 1.0.39, 1.1.13 or higher.

    [,1.0.39)[1.1.0,1.1.13)
    • L
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure due to logging request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs.

    Note:

    This vulnerability affects only invalid HTTP requests where logging at WARN level is enabled.

    How to fix Information Exposure?

    Upgrade io.projectreactor.netty:reactor-netty-http to version 1.0.24 or higher.

    [1.0.11,1.0.24)