Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
History
07 Jul 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2019:3892Â - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://github.com/netty/netty/issues/9571Â - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://github.com/netty/netty/compare/netty-4.1.41.Final...netty-4.1.42.Final - Patch, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:3901Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0159Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0445Â - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4597Â - Third Party Advisory | |
References | () https://seclists.org/bugtraq/2020/Jan/6Â - Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/4532-1/Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0161Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0164Â - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/09/msg00035.html - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0160Â - Third Party Advisory |
07 Nov 2023, 03:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-09-26 16:15
Updated : 2025-07-07 17:15
NVD link : CVE-2019-16869
Mitre link : CVE-2019-16869
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux
- jboss_enterprise_application_platform
canonical
- ubuntu_linux
netty
- netty
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')