Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
Link | Tags |
---|---|
https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp | third party advisory mitigation |
https://github.com/netty/netty/issues/13084 | issue tracking exploit third party advisory |
https://github.com/netty/netty/pull/12760 | third party advisory patch |
https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5316 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20230113-0004/ | third party advisory |