Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/io.netty/netty-codec-http@4.1.11.Final
purl pkg:maven/io.netty/netty-codec-http@4.1.11.Final
Next non-vulnerable version 4.1.125.Final
Latest non-vulnerable version 4.2.10.Final
Risk 4.5
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-3mgs-vrus-q3ag
Aliases:
CVE-2019-20445
GHSA-p2v9-g2qv-p635
HTTP Request Smuggling in Netty HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
4.1.44.Final
Affected by 4 other vulnerabilities.
VCID-e92u-331h-bkcb
Aliases:
CVE-2021-21290
GHSA-5mcr-gq6c-3hq2
This advisory has been marked as False Positive and moved to `netty-codec-http`, `netty-handler` and `netty-common`.
4.1.59.Final
Affected by 3 other vulnerabilities.
VCID-m9t3-3sxz-8faz
Aliases:
CVE-2019-20444
GHSA-cqqj-4p63-rrmm
HTTP Request Smuggling in Netty HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
4.1.44
Affected by 0 other vulnerabilities.
4.1.44.Final
Affected by 4 other vulnerabilities.
VCID-mba8-bg91-77ak
Aliases:
CVE-2019-16869
GHSA-p979-4mfw-53vg
HTTP Request Smuggling in Netty Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
4.1.42.Final
Affected by 6 other vulnerabilities.
VCID-n9u5-a8js-hbf2
Aliases:
CVE-2025-58056
GHSA-fghv-69vj-qj49
Netty vulnerable to request smuggling due to incorrect parsing of chunk extensions ## Summary A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with chunked encoding can lead to request smuggling issues with some reverse proxies. ## Details When encountering a newline character (LF) while parsing a chunk extension, netty interprets the newline as the end of the chunk-size line regardless of whether a preceding carriage return (CR) was found. This is in violation of the HTTP 1.1 standard which specifies that the chunk extension is terminated by a CRLF sequence (see the [RFC](https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding)). This is by itself harmless, but consider an intermediary with a similar parsing flaw: while parsing a chunk extension, the intermediary interprets an LF without a preceding CR as simply part of the chunk extension (this is also in violation of the RFC, because whitespace characters are not allowed in chunk extensions). We can use this discrepancy to construct an HTTP request that the intermediary will interpret as one request but netty will interpret as two (all lines ending with CRLF, notice the LFs in the chunk extension): ``` POST /one HTTP/1.1 Host: localhost:8080 Transfer-Encoding: chunked 48;\nAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\n0 POST /two HTTP/1.1 Host: localhost:8080 Transfer-Encoding: chunked 0 ``` The intermediary will interpret this as a single request. Once forwarded to netty, netty will interpret it as two separate requests. This is a problem, because attackers can then the intermediary, as well as perform standard request smuggling attacks against other live users (see [this Portswigger article](https://portswigger.net/web-security/request-smuggling/exploiting)). ## Impact This is a request smuggling issue which can be exploited for bypassing front-end access control rules as well as corrupting the responses served to other live clients. The impact is high, but it only affects setups that use a front-end which: 1. Interprets LF characters (without preceding CR) in chunk extensions as part of the chunk extension. 2. Forwards chunk extensions without normalization. ## Disclosure - This vulnerability was disclosed on June 18th, 2025 here: https://w4ke.info/2025/06/18/funky-chunks.html ## Discussion Discussion for this vulnerability can be found here: - https://github.com/netty/netty/issues/15522 - https://github.com/JLLeitschuh/unCVEed/issues/1 ## Credit - Credit to @JeppW for uncovering this vulnerability. - Credit to @JLLeitschuh at [Socket](https://socket.dev/) for coordinating the vulnerability disclosure.
4.1.125.Final
Affected by 0 other vulnerabilities.
4.2.5.Final
Affected by 0 other vulnerabilities.
VCID-rewk-dvth-tubh
Aliases:
CVE-2024-29025
GHSA-5jpm-x58v-624v
Netty's HttpPostRequestDecoder can OOM ### Summary The `HttpPostRequestDecoder` can be tricked to accumulate data. I have spotted currently two attack vectors ### Details 1. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. 2. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits ### PoC Here is a Netty branch that provides a fix + tests : https://github.com/vietj/netty/tree/post-request-decoder Here is a reproducer with Vert.x (which uses this decoder) https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3 ### Impact Any Netty based HTTP server that uses the `HttpPostRequestDecoder` to decode a form.
4.1.108.Final
Affected by 1 other vulnerability.
VCID-swu5-a9h5-ffex
Aliases:
CVE-2021-43797
GHSA-wx5j-54mm-rqqq
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') This CVE has been marked as a False Positive and has been removed.
4.1.71
Affected by 0 other vulnerabilities.
4.1.71.Final
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:40:06.139613+00:00 GitLab Importer Affected by VCID-n9u5-a8js-hbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2025-58056.yml 38.4.0
2026-04-16T22:54:42.433525+00:00 GitLab Importer Affected by VCID-rewk-dvth-tubh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2024-29025.yml 38.4.0
2026-04-16T21:36:00.889495+00:00 GitLab Importer Affected by VCID-swu5-a9h5-ffex https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-43797.yml 38.4.0
2026-04-16T21:17:03.705338+00:00 GitLab Importer Affected by VCID-e92u-331h-bkcb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-21290.yml 38.4.0
2026-04-16T21:00:52.227102+00:00 GitLab Importer Affected by VCID-m9t3-3sxz-8faz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20444.yml 38.4.0
2026-04-16T21:00:13.381128+00:00 GitLab Importer Affected by VCID-3mgs-vrus-q3ag https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20445.yml 38.4.0
2026-04-16T20:57:35.152258+00:00 GitLab Importer Affected by VCID-mba8-bg91-77ak https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-16869.yml 38.4.0
2026-04-12T01:00:52.213923+00:00 GitLab Importer Affected by VCID-n9u5-a8js-hbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2025-58056.yml 38.3.0
2026-04-12T00:13:11.768303+00:00 GitLab Importer Affected by VCID-rewk-dvth-tubh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2024-29025.yml 38.3.0
2026-04-11T22:49:41.283626+00:00 GitLab Importer Affected by VCID-swu5-a9h5-ffex https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-43797.yml 38.3.0
2026-04-11T22:29:13.231661+00:00 GitLab Importer Affected by VCID-e92u-331h-bkcb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-21290.yml 38.3.0
2026-04-11T22:12:07.965045+00:00 GitLab Importer Affected by VCID-m9t3-3sxz-8faz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20444.yml 38.3.0
2026-04-11T22:11:28.766660+00:00 GitLab Importer Affected by VCID-3mgs-vrus-q3ag https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20445.yml 38.3.0
2026-04-11T22:08:40.596628+00:00 GitLab Importer Affected by VCID-mba8-bg91-77ak https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-16869.yml 38.3.0
2026-04-03T01:09:05.010716+00:00 GitLab Importer Affected by VCID-n9u5-a8js-hbf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2025-58056.yml 38.1.0
2026-04-03T00:19:30.011334+00:00 GitLab Importer Affected by VCID-rewk-dvth-tubh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2024-29025.yml 38.1.0
2026-04-02T22:59:07.584729+00:00 GitLab Importer Affected by VCID-swu5-a9h5-ffex https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-43797.yml 38.1.0
2026-04-02T22:40:47.308648+00:00 GitLab Importer Affected by VCID-e92u-331h-bkcb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-21290.yml 38.1.0
2026-04-02T22:24:35.885409+00:00 GitLab Importer Affected by VCID-m9t3-3sxz-8faz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20444.yml 38.1.0
2026-04-02T22:23:59.163564+00:00 GitLab Importer Affected by VCID-3mgs-vrus-q3ag https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20445.yml 38.1.0
2026-04-02T22:21:20.877824+00:00 GitLab Importer Affected by VCID-mba8-bg91-77ak https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-16869.yml 38.1.0
2026-04-01T17:17:48.193628+00:00 GitLab Importer Affected by VCID-swu5-a9h5-ffex https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-43797.yml 38.0.0
2026-04-01T16:58:14.944416+00:00 GitLab Importer Affected by VCID-e92u-331h-bkcb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2021-21290.yml 38.0.0
2026-04-01T16:42:27.262830+00:00 GitLab Importer Affected by VCID-m9t3-3sxz-8faz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20444.yml 38.0.0
2026-04-01T16:41:48.047858+00:00 GitLab Importer Affected by VCID-3mgs-vrus-q3ag https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-20445.yml 38.0.0
2026-04-01T16:39:06.655551+00:00 GitLab Importer Affected by VCID-mba8-bg91-77ak https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2019-16869.yml 38.0.0