HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
01 Jul 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2020:0811Ā - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0601Ā - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0804Ā - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0497Ā - Third Party Advisory | |
References | () https://github.com/netty/netty/issues/9866Ā - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/02/msg00018.htmlĀ - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00004.htmlĀ - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4885Ā - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00003.htmlĀ - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0605Ā - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0805Ā - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0567Ā - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0606Ā - Third Party Advisory | |
References | () https://usn.ubuntu.com/4532-1/Ā - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/02/msg00017.htmlĀ - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0806Ā - Third Party Advisory | |
References | () https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.FinalĀ - Patch, Third Party Advisory |
07 Nov 2023, 03:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-01-29 21:15
Updated : 2025-07-01 18:15
NVD link : CVE-2019-20444
Mitre link : CVE-2019-20444
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux
- jboss_amq_clients
- jboss_enterprise_application_platform
fedoraproject
- fedora
canonical
- ubuntu_linux
netty
- netty
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')