CVE-2021-21409
ADVISORY - githubSummary
Impact
The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1
This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.
Patches
This was fixed as part of 4.1.61.Final
Workarounds
Validation can be done by the user before proxy the request by validating the header.
Common Weakness Enumeration (CWE)
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
NIST
2.2
CVSS SCORE
5.9mediumGitHub
2.2
CVSS SCORE
5.9mediumDebian
-
Ubuntu
2.2
CVSS SCORE
5.9mediumRed Hat
2.2
CVSS SCORE
5.9mediumRocky
-
CVSS SCORE
N/AlowChainguard
CGA-494w-f4g6-835m
-
Chainguard
CGA-c2w9-39fx-cvc6
-
Chainguard
CGA-w5v7-493q-c2hq
-