com.typesafe.akka:akka-http-core@3.0.0-RC1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.typesafe.akka:akka-http-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Resource Shutdown or Release

com.typesafe.akka:akka-http-core is a full server- and client-side HTTP stack on top of akka-actor and akka-stream.

Affected versions of this package are vulnerable to Improper Resource Shutdown or Release which can encounter stack exhaustion while parsing HTTP headers. It allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments.

How to fix Improper Resource Shutdown or Release?

Upgrade com.typesafe.akka:akka-http-core to version 10.2.7, 10.1.15 or higher.

[10.2.0-M1,10.2.7) [,10.1.15)
  • M
HTTP Request Smuggling

com.typesafe.akka:akka-http-core is a full server- and client-side HTTP stack on top of akka-actor and akka-stream.

Affected versions of this package are vulnerable to HTTP Request Smuggling. It allows multiple Transfer-Encoding headers.

How to fix HTTP Request Smuggling?

Upgrade com.typesafe.akka:akka-http-core to version 10.2.4, 10.1.14 or higher.

[10.2.0,10.2.4) [,10.1.14)
  • H
Denial of Service (DoS)

com.typesafe.akka:akka-http-core is a full server- and client-side HTTP stack on top of akka-actor and akka-stream.

Affected versions of this package are vulnerable to Denial of Service (DoS). An attacker may sent a request that contains an Accept header with an unsupported media range beginning with a wildcard. This will cause a stack overflow during negotiation of the content type. Normally, stack overflows are treated as fatal errors, so that the JVM process will shut itself down immediately.

How to fix Denial of Service (DoS)?

Upgrade com.typesafe.akka:akka-http-core to version 10.0.6 or higher.

[,10.0.6)