DirectorySecurity Advisories
Sign In
Security Advisories

CGA-494w-f4g6-835m

Published

Last updated

https://images.chainguard.dev/security/CGA-494w-f4g6-835m
Package

druid

Latest Update
Not affected
Aliases
  • CVE-2021-21409
  • GHSA-f256-j965-7f32

Severity

5.9

Medium

CVSS V3

Summary

Possible request smuggling in HTTP/2 due missing validation of content-length

Description

Impact

The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1

This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.

Patches

This was fixed as part of 4.1.61.Final

Workarounds

Validation can be done by the user before proxy the request by validating the header.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images