io.netty:netty-codec-http2@4.1.60.Final vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the io.netty:netty-codec-http2 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the implementation of the HTTP/2 protocol. An attacker can cause a denial of service (including via DDoS) by rapidly resetting many streams through request cancellation.

How to fix Denial of Service (DoS)?

Upgrade io.netty:netty-codec-http2 to version 4.1.100.Final or higher.

[,4.1.100.Final)
  • M
HTTP Request Smuggling

io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

Affected versions of this package are vulnerable to HTTP Request Smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a follow-up of CVE-2021-21295 which did not fix this specific case.

How to fix HTTP Request Smuggling?

Upgrade io.netty:netty-codec-http2 to version 4.1.61.Final or higher.

[,4.1.61.Final)