CVE-2024-29025
MEDIUMNetty < 4.1.108 - Resource Allocation Without Limits
Title source: ruleDescription
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.
References (4)
Core 4
Core References
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00015.html
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v
Patch x_refsource_misc
https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c
Exploit x_refsource_misc
https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3
Scores
CVSS v3
5.3
EPSS
0.0032
EPSS Percentile
55.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (3)
debian/debian_linux
10.0
io.netty/netty-codec-http
0 - 4.1.108.FinalMaven
netty/netty
< 4.1.108
Published
Mar 25, 2024
Tracked Since
Feb 18, 2026