VYPR

Maven package

io.netty/netty-codec-http

pkg:maven/io.netty/netty-codec-http

Vulnerabilities (15)

  • CVE-2026-42587HigMay 13, 2026
    affected >= 4.2.0.Alpha1, < 4.2.13.Finalfixed 4.2.13.Final

    Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, HttpContentDecompressor accepts a maxAllocation parameter to limit decompression buffer size and prevent decompression bomb attacks. This limit is correctly enforced for

  • CVE-2026-42585MedMay 13, 2026
    affected >= 4.2.0.Alpha1, < 4.2.13.Finalfixed 4.2.13.Final

    Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty incorrectly parses malformed Transfer-Encoding, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.

  • CVE-2026-42584HigMay 13, 2026
    affected >= 4.2.0.Alpha1, < 4.2.13.Finalfixed 4.2.13.Final

    Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, HttpClientCodec pairs each inbound response with an outbound request by queue.poll() once per response, including for 1xx. If the client pipelines GET then HEAD and the

  • CVE-2026-42581MedMay 13, 2026
    affected >= 4.2.0.Alpha1, < 4.2.13.Finalfixed 4.2.13.Final

    Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, HttpObjectDecoder strips a conflicting Content-Length header when a request carries both Transfer-Encoding: chunked and Content-Length, but only for HTTP/1.1 messages. T

  • CVE-2026-42580MedMay 13, 2026
    affected >= 4.2.0.Alpha1, < 4.2.13.Finalfixed 4.2.13.Final

    Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's chunk size parser silently overflows int, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.

  • CVE-2026-41417MedMay 6, 2026
    affected < 4.1.133.Finalfixed 4.1.133.Final

    Netty allows request-line validation to be bypassed when a `DefaultHttpRequest` or `DefaultFullHttpRequest` is created first and its URI is later changed via `setUri()`. The constructors reject CRLF and whitespace characters that would break the start-line, but `setUri()` does no

  • CVE-2026-33870Mar 27, 2026
    affected < 4.1.132.Finalfixed 4.1.132.Final

    Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final an

  • CVE-2025-67735Dec 16, 2025
    affected >= 4.2.0.Alpha1, < 4.2.8.Finalfixed 4.2.8.Final

    Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with the request URI when constructing a request. This leads to request smuggling wh

  • CVE-2025-58056Sep 3, 2025
    affected < 4.1.125.Finalfixed 4.1.125.Final

    Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a ch

  • CVE-2024-29025Mar 25, 2024
    affected < 4.1.108.Finalfixed 4.1.108.Final

    Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, t

  • CVE-2022-41915Dec 13, 2022
    affected >= 4.1.83.Final, < 4.1.86.Finalfixed 4.1.86.Final

    Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values

  • CVE-2022-24823May 6, 2022
    affected < 4.1.77.Finalfixed 4.1.77.Final

    Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur

  • CVE-2021-43797Dec 9, 2021
    affected >= 4.0.0, < 4.1.71.Finalfixed 4.1.71.Final

    Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It shoul

  • CVE-2021-21290Feb 8, 2021
    affected >= 4.0.0, < 4.1.59.Finalfixed 4.1.59.Final

    Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file.

  • CVE-2019-20444Jan 29, 2020
    affected < 4.1.44fixed 4.1.44

    HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."