Information Disclosure Affecting io.netty:netty-common package, versions [4.0.0.Final, 4.1.59.Final)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-IONETTY-1082234
  • published9 Feb 2021
  • disclosed9 Feb 2021
  • creditJonathan Leitschuh

Introduced: 9 Feb 2021

CVE-2021-21290  (opens in a new tab)
CWE-378  (opens in a new tab)

How to fix?

Upgrade io.netty:netty-common to version 4.1.59.Final or higher.

Overview

Affected versions of this package are vulnerable to Information Disclosure via the AbstractDiskHttpData method, and on Unix-like systems.

When netty's multipart decoders are used, local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk are enabled. On unix-like systems, the temporary directory is shared between all users. As such, writing to this directory using API's that do not explicitly set the file/directory permissions can lead to information disclosure. The method File.createTempFile on unix-like systems creates a random file, but, by default will create this file with the permissions -rw-r--r--. Sensitive information is written to this file in AbstractDiskHttpData, and other local users can read it.

References

CVSS Base Scores

version 3.1