DoS Via Malformed URL with Reactor Netty HTTP Server
Description
Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reactor Netty HttpServer versions 0.9.3 and 0.9.4 prematurely close connections on URISyntaxException instead of returning a 400 response.
Vulnerability
Overview CVE-2020-5403 affects Reactor Netty HttpServer versions 0.9.3 and 0.9.4. The vulnerability arises when the server encounters a URISyntaxException while parsing an incoming HTTP request. Instead of properly handling the error by sending a 400 Bad Request response, the server prematurely closes the connection, leading to an incomplete or failed request handling [1].
Exploitation
Scenario An attacker can exploit this issue by sending specially crafted HTTP requests with malformed URIs to the vulnerable server. The attack does not require authentication, as it targets the request parsing phase before any access control is applied. The attacker must be able to send requests to the server, which is typically possible over the network if the server is exposed.
Impact
The immediate impact is that clients receive a connection close instead of a proper error response, which can disrupt normal client-server communication. This behavior can be leveraged to cause a denial of service by repeatedly sending malformed requests, exhausting server resources or confusing client-side logic that expects a valid HTTP response.
Mitigation
The issue is resolved in later versions of Reactor Netty. Users running versions 0.9.3 or 0.9.4 should upgrade to a patched version (e.g., 0.9.5 or higher) to ensure proper error responses and connection handling [1]. No workarounds are documented, so upgrading is the recommended course of action.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.projectreactor.netty:reactor-netty-httpMaven | >= 0.9.3, < 0.9.5 | 0.9.5 |
Affected products
2- Pivotal/Reactor Nettyv5Range: 0.9 v0.9.3.RELEASE
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-hp5x-rqf7-43vfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-5403ghsaADVISORY
- pivotal.io/security/cve-2020-5403ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.