Improper Input Validation Affecting org.http4s:http4s-core_3 package, versions [0.22.0,0.22.15)[0.23.0,0.23.17)[1.0.0-M1,1.0.0-M38)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGHTTP4S-3226403
  • published5 Jan 2023
  • disclosed5 Jan 2023
  • creditUnknown

Introduced: 5 Jan 2023

CVE-2023-22465  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade org.http4s:http4s-core_3 to version 0.22.15, 0.23.17, 1.0.0-M38 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation such that the User-Agent and Server header parsers are susceptible to a fatal error on certain inputs.

Workaround

Users who are unable to upgrade to the fixed version can use the weakly typed header interface.

v0.21.x

val safe: Option[Header] = req.headers.get("User-Agent".ci)
// but don't do this
val unsafe = header.map(_.parsed)

v0.22.x, v0.23.x, v1.x

val safe: Option[Header] = req.headers.get(ci"User-Agent")

CVSS Scores

version 3.1