CVE-2019-20444

ADVISORY - github

Summary

HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."

EPSS Score: 0.02841 (0.856)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

ADVISORY - github

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in