Improper Certificate Validation

Affecting io.netty:netty-handler artifact, versions [4.1.0.Final,]

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Affected versions of this package are vulnerable to Improper Certificate Validation. Certificate hostname validation is disabled by default in Netty 4.1.x which makes it potentially susceptible to Man-in-the-Middle attacks.

Remediation

There is no fixed version for io.netty:netty-handler.

References

CVSS Score

5.6
medium severity
  • Attack Vector
    Adjacent
  • Attack Complexity
    High
  • Privileges Required
    Low
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    Low
  • Availability
    Low
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L/E:U/RL:U/RC:R
Credit
Unknown
CWE
CWE-295
Snyk ID
SNYK-JAVA-IONETTY-1042268
Disclosed
19 Nov, 2020
Published
20 Nov, 2020