CVE-2022-41915

CVSS V2 None CVSS V3 None
Description
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
Overview
  • CVE ID
  • CVE-2022-41915
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-12-13T07:15:13
  • Last Modified Date
  • 2023-03-01T15:09:57
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:netty:netty:4.1.86:*:*:*:*:*:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2022-12-13 08:15:20 Added to TrackCVE
2022-12-13 14:15:27 2022-12-13T07:15:13.557 2022-12-13T07:15:13 CVE Published Date updated
2022-12-13 14:15:27 2022-12-13T13:33:15 CVE Modified Date updated
2022-12-13 14:15:27 Received Awaiting Analysis Vulnerability Status updated
2022-12-13 19:16:31 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-19 17:13:28 2022-12-19T16:55:57 CVE Modified Date updated
2022-12-19 17:13:28 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-19 17:13:34 CWE-436 Weakness Enumeration updated
2022-12-19 17:13:39 CPE Information updated
2022-12-21 15:15:09 2022-12-21T14:45:34 CVE Modified Date updated
2022-12-21 15:15:10 Weakness Enumeration update
2023-01-10 23:15:50 2023-01-10T23:15:10 CVE Modified Date updated
2023-01-10 23:15:50 Analyzed Modified Vulnerability Status updated
2023-01-10 23:15:50 Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values. Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values. Description updated
2023-01-10 23:15:51 References updated
2023-01-12 05:15:23 2023-01-12T04:15:09 CVE Modified Date updated
2023-01-12 05:15:23 Modified Undergoing Analysis Vulnerability Status updated
2023-01-12 05:15:25 References updated
2023-01-13 09:16:32 2023-01-13T09:15:09 CVE Modified Date updated
2023-01-13 09:16:34 References updated
2023-03-01 15:14:27 2023-03-01T15:09:57 CVE Modified Date updated
2023-03-01 15:14:27 Undergoing Analysis Analyzed Vulnerability Status updated