Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk:Medium] Flyway io.netty:netty-codec-http Allocation of Resources Without Limits or Throttling (due on 05/27/2024) #5776

Closed
1 task
tmpayton opened this issue Mar 27, 2024 · 1 comment
Assignees
Labels
Needs refinement Security: general General security concern or issue Security: moderate Remediate within 60 days
Milestone

Comments

@tmpayton
Copy link
Contributor

tmpayton commented Mar 27, 2024

io.netty:netty-codec-http Allocation of Resources Without Limits or Throttling

VULNERABILITY
CWE-770OPEN THIS LINK IN A NEW TAB
CVE-2024-29025OPEN THIS LINK IN A NEW TAB
CVSS 5.3OPEN THIS LINK IN A NEW TAB MEDIUM
SNYK-JAVA-IONETTY-6483812OPEN THIS LINK IN A NEW TAB

Introduced through
org.flywaydb:[email protected]
Fixed in
io.netty:[email protected]

Exploit maturity
PROOF OF CONCEPT

Detailed paths
Introduced through: unknown:[email protected] › org.flywaydb:[email protected] › software.amazon.awssdk:[email protected] › software.amazon.awssdk:[email protected] › io.netty:[email protected]
Introduced through: unknown:[email protected] › org.flywaydb:[email protected] › software.amazon.awssdk:[email protected] › software.amazon.awssdk:[email protected] › io.netty:[email protected] › io.netty:[email protected]
Security information
Factors contributing to the scoring:
Snyk: CVSS 5.3 - Medium Severity

NVD: Not available. NVD has not yet published its analysis.
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
io.netty:netty-codec-http is a network application framework for rapid development of maintainable high performance protocol servers & clients.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing for data to accumulate without limits.

An attacker can cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.

Learn about this type of vulnerability

Completion Criteria

  • Upgrade flyway to 10.11.0
@tmpayton tmpayton added Security: moderate Remediate within 60 days Security: general General security concern or issue labels Mar 27, 2024
@tmpayton tmpayton added this to the 24.6 milestone Apr 3, 2024
@tmpayton tmpayton moved this to 🔨 Pre-refinement in Website project Apr 3, 2024
@cnlucas cnlucas moved this from 🔨 Pre-refinement to 🔜 Sprint backlog in Website project Apr 4, 2024
@cnlucas cnlucas self-assigned this Apr 9, 2024
@cnlucas cnlucas moved this from 🔜 Sprint backlog to 📥 Assigned in Website project Apr 9, 2024
@pkfec
Copy link
Contributor

pkfec commented Apr 23, 2024

flyway upgraded to v10.11.1 in pr #5801. Closing this issue

@pkfec pkfec closed this as completed Apr 23, 2024
@github-project-automation github-project-automation bot moved this from 📥 Assigned to ✅ Done in Website project Apr 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Needs refinement Security: general General security concern or issue Security: moderate Remediate within 60 days
Projects
Status: ✅ Done
Development

No branches or pull requests

3 participants