Search for packages
Package details: pkg:maven/io.netty/netty-codec-http@4.1.83
purl pkg:maven/io.netty/netty-codec-http@4.1.83
Tags Ghost
Next non-vulnerable version 4.1.108.Final
Latest non-vulnerable version 4.1.108.Final
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-hhjt-y9d5-eugn
Aliases:
CVE-2022-41915
GHSA-hh82-3pmq-7frp
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
4.1.86.Final
Affected by 1 other vulnerability.
4.1.86
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-04T13:56:55.990843+00:00 GitLab Importer Affected by VCID-hhjt-y9d5-eugn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/io.netty/netty-codec-http/CVE-2022-41915.yml 37.0.0