Skip to content

HTTP Response splitting from assigning header value iterator

Low
normanmaurer published GHSA-hh82-3pmq-7frp Dec 12, 2022

Package

maven io.netty.codec:codec-http (Maven)

Affected versions

4.1.83.Final, 4.1.84.Final, 4.1.85.Final

Patched versions

4.1.86.Final

Description

Impact

When calling DefaultHttpHeaders.set with an iterator of values (as opposed to a single given value), header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting.

Patches

The necessary validation was added in Netty 4.1.86.Final.

Workarounds

Integrators can work around the issue by changing the DefaultHttpHeaders.set(CharSequence, Iterator<?>) call, into a remove() call, and call add() in a loop over the iterator of values.

References

HTTP Response Splitting
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers

For more information

If you have any questions or comments about this advisory:

Severity

Low
0.0
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
None
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N

CVE ID

CVE-2022-41915

Weaknesses

Credits