VYPR
Moderate severityNVD Advisory· Published Oct 19, 2022· Updated May 9, 2025

CVE-2022-31684

CVE-2022-31684

Description

Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reactor Netty HTTP Server 1.0.11-1.0.23 may log request headers containing access tokens in some invalid HTTP requests, exposing them to log readers.

Description

Reactor Netty HTTP Server versions 1.0.11 through 1.0.23 contain a vulnerability where, under specific conditions, request headers may be logged for invalid HTTP requests. The logging occurs at the WARN level, which is not the default configuration (ERROR is default). This behavior can inadvertently expose sensitive data such as access tokens that are present in the request headers [1][2].

Exploitation

An attacker does not need to authenticate to the server to trigger this logging; any party capable of sending HTTP requests can cause an invalid request that results in header logging. However, to exploit the leaked information, the attacker must have access to the server logs. The vulnerability only manifests when the log level is set to WARN or higher (but not ERROR), and only for requests that are considered invalid by the server [1][2].

Impact

If an attacker gains access to server logs containing headers from such invalid requests, they could retrieve valid access tokens. These tokens could then be used to impersonate legitimate users or access protected resources, depending on the token's scope and validity period. The impact is limited to environments where log access is not tightly controlled and where tokens are routinely passed in request headers [1][2].

Mitigation

The vulnerability is fixed in Reactor Netty version 1.0.24 (reactor-bom 2020.0.24). Users on affected versions should upgrade to the patched release. Additionally, ensuring that the log level is not set to WARN or lower for the relevant logger can prevent the behavior, though upgrading is the recommended remediation [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
io.projectreactor.netty:reactor-netty-httpMaven
>= 1.0.11, < 1.0.241.0.24

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.