DirectorySecurity Advisories
Sign In
Security Advisories

CGA-2vx5-qv6g-67jq

Published

Last updated

https://images.chainguard.dev/security/CGA-2vx5-qv6g-67jq
Package

druid

Latest Update
Not affected
Aliases
  • CVE-2021-43797
  • GHSA-wx5j-54mm-rqqq

Severity

6.5

Medium

CVSS V3

Summary

HTTP request smuggling in netty

Description

Impact

Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling.

Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images