CVE-2024-29025
ADVISORY - githubSummary
Summary
The HttpPostRequestDecoder
can be tricked to accumulate data. I have spotted currently two attack vectors
Details
- While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the
bodyListHttpData
list. - The decoder cumulates bytes in the
undecodedChunk
buffer until it can decode a field, this field can cumulate data without limits
PoC
Here is a Netty branch that provides a fix + tests : https://github.com/vietj/netty/tree/post-request-decoder
Here is a reproducer with Vert.x (which uses this decoder) https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3
Impact
Any Netty based HTTP server that uses the HttpPostRequestDecoder
to decode a form.
Common Weakness Enumeration (CWE)
Allocation of Resources Without Limits or Throttling
Allocation of Resources Without Limits or Throttling
Allocation of Resources Without Limits or Throttling
NIST
3.9
CVSS SCORE
5.3mediumGitHub
3.9
CVSS SCORE
5.3mediumDebian
-
Ubuntu
-
CVSS SCORE
N/AmediumRed Hat
3.9
CVSS SCORE
5.3mediumChainguard
CGA-4f97-xch2-fqp3
-
Chainguard
CGA-6cwx-g7qh-f32h
-
Chainguard
CGA-7mgp-57h7-566c
-
Chainguard
CGA-7p98-j4rx-8p2r
-
Chainguard
CGA-7wc9-mhwq-jwvr
-
Chainguard
CGA-8j3m-v98r-qphw
-
Chainguard
CGA-c95w-hpgw-m6fm
-
Chainguard
CGA-cvrj-h7rr-r975
-
Chainguard
CGA-cx4c-8h3v-frh7
-
Chainguard
CGA-cx67-5fmv-3xqf
-
Chainguard
CGA-hc93-8f6j-gjx4
-
Chainguard
CGA-hfg5-99f4-gpwm
-
Chainguard
CGA-jx63-354g-58c6
-
Chainguard
CGA-mg88-xp72-r37f
-
Chainguard
CGA-mgv4-g226-vxr2
-
Chainguard
CGA-q576-4g28-x6p5
-
Chainguard
CGA-q64j-qccg-v8v2
-
Chainguard
CGA-r5f9-9h89-fvvx
-
Chainguard
CGA-vcc9-rm4p-6mgh
-
Chainguard
CGA-wgjc-48pj-2f8c
-
Chainguard
CGA-whmv-c3jv-fc9f
-
Chainguard
CGA-wqhj-xxjq-qrjf
-
Chainguard
CGA-x7wj-6xrg-5wpm
-