Improper Certificate Validation Affecting io.netty:netty-handler Open this link in a new tab package, versions [4.1.0.Final,]


0.0
medium
  • Attack Complexity

    High

  • User Interaction

    Required

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-IONETTY-1042268

  • published

    20 Nov 2020

  • disclosed

    19 Nov 2020

  • credit

    Unknown

Introduced: 19 Nov 2020

CWE-295 Open this link in a new tab

How to fix?

There is no fixed version for io.netty:netty-handler.

Overview

io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Affected versions of this package are vulnerable to Improper Certificate Validation. Certificate hostname validation is disabled by default in Netty 4.1.x which makes it potentially susceptible to Man-in-the-Middle attacks.