Unknown
CVE-2021-43797
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-43797
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to “sanitize” header names before it forward these to another remote system when used as proxy. This remote system can’t see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- netapp,
- netty,
- oracle,
- quarkus
Products
- banking deposits and lines of credit servicing 2.7,
- banking party management 2.7.0,
- banking platform 2.6.2,
- coherence 12.2.1.4.0,
- coherence 14.1.1.0.0,
- communications cloud native core binding support function 1.11.0,
- communications cloud native core network slice selection function 1.8.0,
- communications cloud native core policy 1.15.0,
- communications cloud native core security edge protection proxy 1.7.0,
- communications cloud native core unified data repository 1.15.0,
- communications design studio 7.4.2,
- communications instant messaging server 8.1,
- debian linux 10.0,
- debian linux 11.0,
- helidon 1.4.10,
- helidon 2.4.0,
- netty,
- oncommand workflow automation -,
- peoplesoft enterprise peopletools 8.58,
- peoplesoft enterprise peopletools 8.59,
- quarkus,
- snapcenter -
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: