Improper Certificate Validation Affecting io.netty:netty-handler Open this link in a new tab package, versions [4.1.0.Final,]
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
20 Nov 2020
19 Nov 2020
Introduced: 19 Nov 2020CWE-295 Open this link in a new tab
How to fix?
There is no fixed version for
io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.
Affected versions of this package are vulnerable to Improper Certificate Validation. Certificate hostname validation is disabled by default in
Netty 4.1.x which makes it potentially susceptible to Man-in-the-Middle attacks.