Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/eap7-netty@4.1.63-1.Final_redhat_00001.1?arch=el8eap
purl pkg:rpm/redhat/eap7-netty@4.1.63-1.Final_redhat_00001.1?arch=el8eap
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-ft9p-n5ew-abbf
Aliases:
CVE-2021-3536
GHSA-v2wx-jj66-2hp7
Cross-site Scripting in Wildfly A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity. There are no reported fixed by versions.
VCID-hzxz-sqmu-s7e1
Aliases:
CVE-2021-21409
GHSA-f256-j965-7f32
Possible request smuggling in HTTP/2 due missing validation of content-length ### Impact The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case. ### Patches This was fixed as part of 4.1.61.Final ### Workarounds Validation can be done by the user before proxy the request by validating the header. There are no reported fixed by versions.
VCID-ug8h-p8kf-t7e1
Aliases:
CVE-2021-21295
GHSA-wm47-8v5p-wjpj
Possible request smuggling in HTTP/2 due missing validation ### Impact If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like: ``` POST / HTTP/2 :authority:: externaldomain.com Content-Length: 4 asdfGET /evilRedirect HTTP/1.1 Host: internaldomain.com ``` Users are only affected if all of this is `true`: * `HTTP2MultiplexCodec` or `Http2FrameCodec` is used * `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects * These HTTP/1.1 objects are forwarded to another remote peer. ### Patches This has been patched in 4.1.60.Final ### Workarounds The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`. ### References Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980 There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:02:51.783477+00:00 RedHat Importer Affected by VCID-ug8h-p8kf-t7e1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21295.json 38.0.0
2026-04-01T14:02:39.414794+00:00 RedHat Importer Affected by VCID-hzxz-sqmu-s7e1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21409.json 38.0.0
2026-04-01T14:02:32.173588+00:00 RedHat Importer Affected by VCID-ft9p-n5ew-abbf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3536.json 38.0.0