You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cassandra.apache.org by "Stefan Miklosovic (Jira)" <ji...@apache.org> on 2021/09/24 14:17:00 UTC

[jira] [Updated] (CASSANDRA-15417) CVE-2019-16869(Netty is vulnerable to HTTP Request Smuggling) of severity 7.5

     [ https://issues.apache.org/jira/browse/CASSANDRA-15417?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Stefan Miklosovic updated CASSANDRA-15417:
------------------------------------------
    Resolution: Not A Problem
        Status: Resolved  (was: Triage Needed)

> CVE-2019-16869(Netty is vulnerable to HTTP Request Smuggling) of severity 7.5
> -----------------------------------------------------------------------------
>
>                 Key: CASSANDRA-15417
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-15417
>             Project: Cassandra
>          Issue Type: Bug
>            Reporter: Abhishek Singh
>            Priority: Normal
>
> *Description :*
> *Severity :* CVE CVSS 3: 7.5Sonatype CVSS 3: 7.5
> *Weakness :* CVE CWE: 444
> *Source :* National Vulnerability Database
> *Categories :* Data
> *Description from CVE :* Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers , which leads to HTTP request smuggling.
> *Explanation :* Netty is vulnerable to HTTP Request Smuggling. The splitHeader method in HttpObjectDecoder.class does not properly handle HTTP headers containing whitespace between the header field-name and colon. An attacker can exploit this by sending such a header containing this white space and have the header end up being parsed by one endpoint and not another, due to inconsistencies in how the whitespace in the header is handled.
> *Detection :* The application is vulnerable by using this component.
> *Recommendation :* We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
> *Root Cause :* apache-cassandra-3.11.4-bin.tar.gzio/netty/handler/codec/http/HttpObjectDecoder.class : [4.0.0.Beta1, 4.1.42.Final]
> *Advisories :* Project: [https://github.com/netty/netty/issues/9571]
> *CVSS Details :* CVE CVSS 3: 7.5CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
> *Occurences (Paths) :* ["apache-cassandra.zip" ; "apache-cassandra.zip"]
> *CVE :* CVE-2019-16869
> *URL :* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869]
> *Remediation :* This component does not have any non-vulnerable Version. Please contact the vendor to get this vulnerability fixed.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@cassandra.apache.org
For additional commands, e-mail: commits-help@cassandra.apache.org