Description
Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's chunk size parser silently overflows int, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.
Problem types
CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-190: Integer Overflow or Wraparound
Product status
< 4.1.133.Final
< 4.1.133.Final
References
github.com/.../netty/security/advisories/GHSA-m4cv-j2px-7723
github.com/.../netty/security/advisories/GHSA-m4cv-j2px-7723