CVE-2021-43797 (CNNVD-202112-767)

MEDIUM
中文标题:
Netty 环境问题漏洞
英文标题:
HTTP fails to validate against control chars in header names which may lead to HTTP request smuggling
CVSS分数: 6.5
发布时间: 2021-12-09 00:00:00
漏洞类型: 环境问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。 Netty 存在环境问题漏洞,该漏洞源于Netty是一个异步事件驱动的网络应用框架,用于快速开发可维护的高性能协议服务器和客户端。版本4.1.7.1之前的Netty。当控件字符出现在头名称的开头和结尾时,Final将跳过它们。相反,它应该很快失败,因为这是规范不允许的,可能会导致HTTP请求走私。如果没有进行验证,netty可能会在将这些头名称转发给另一个用作代理的远程系统之前对其进行“消毒”。这个远程系统无法再看到无效的使用,因此无法看到

英文描述:

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.

CWE类型:
CWE-444
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
netty netty <= 4.1.7.0.Final - - cpe:2.3:a:netty:netty:<=_4.1.7.0.final:*:*:*:*:*:*:*
netty netty * - - cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*
quarkus quarkus * - - cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*
netapp oncommand_workflow_automation - - - cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
netapp snapcenter - - - cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
oracle banking_deposits_and_lines_of_credit_servicing 2.7 - - cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.7:*:*:*:*:*:*:*
oracle banking_party_management 2.7.0 - - cpe:2.3:a:oracle:banking_party_management:2.7.0:*:*:*:*:*:*:*
oracle banking_platform 2.6.2 - - cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*
oracle coherence 12.2.1.4.0 - - cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*
oracle coherence 14.1.1.0.0 - - cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*
oracle communications_cloud_native_core_binding_support_function 1.11.0 - - cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*
oracle communications_cloud_native_core_network_slice_selection_function 1.8.0 - - cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*
oracle communications_cloud_native_core_policy 1.15.0 - - cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*
oracle communications_cloud_native_core_security_edge_protection_proxy 1.7.0 - - cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*
oracle communications_cloud_native_core_unified_data_repository 1.15.0 - - cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*
oracle communications_design_studio 7.4.2 - - cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*
oracle communications_instant_messaging_server 8.1 - - cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*
oracle helidon 1.4.10 - - cpe:2.3:a:oracle:helidon:1.4.10:*:*:*:*:*:*:*
oracle helidon 2.4.0 - - cpe:2.3:a:oracle:helidon:2.4.0:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.58 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.59 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debian debian_linux 11.0 - - cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update mailing-list
cve.org
访问
DSA-5316 vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
6.5
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
机密性
NONE
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2021-12-09 00:00:00
修改时间:
2024-08-04 04:03:08
创建时间:
2025-11-11 15:37:05
更新时间:
2025-11-11 15:57:04
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2021-43797 2025-11-11 15:21:08 2025-11-11 07:37:05
NVD nvd_CVE-2021-43797 2025-11-11 14:57:46 2025-11-11 07:45:23
CNNVD cnnvd_CNNVD-202112-767 2025-11-11 15:10:46 2025-11-11 07:57:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:57:04
vulnerability_type: 未提取 → 环境问题; cnnvd_id: 未提取 → CNNVD-202112-767; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 环境问题
  • cnnvd_id: 未提取 -> CNNVD-202112-767
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:23
affected_products_count: 1 → 23; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 23
  • data_sources: ['cve'] -> ['cve', 'nvd']