CVE-2021-21409

MEDIUM

Netty < 4.1.61 - HTTP Request Smuggling

Title source: rule
STIX 2.1

Description

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.

References (59)

... and 39 more

Scores

CVSS v3 5.9
EPSS 0.0255
EPSS Percentile 85.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

CWE
CWE-444
Status published
Products (29)
debian/debian_linux 10.0
io.netty/netty 0Maven
io.netty/netty-codec-http2 4.0.0 - 4.1.61.FinalMaven
netapp/oncommand_api_services
netapp/oncommand_workflow_automation
netty/netty < 4.1.61
oracle/banking_corporate_lending_process_management 14.2.0
oracle/banking_corporate_lending_process_management 14.3.0
oracle/banking_corporate_lending_process_management 14.5.0
oracle/banking_credit_facilities_process_management 14.2.0
... and 19 more
Published Mar 30, 2021
Tracked Since Feb 18, 2026