CVE-2019-20445
Header Parsing vulnerability in netty-handler (Maven)

Header Parsing No known exploit

What is CVE-2019-20445 About?

This vulnerability in Netty allows malformed HTTP headers where a Content-Length header can be accompanied by another Content-Length or a Transfer-Encoding header. This could lead to request smuggling or bypasses, posing a moderate impact. Exploitation would likely involve crafting specific HTTP requests, which could be relatively easy for an attacker.

Affected Software

io.netty:netty-handler >4.0.0, <4.1.45

Technical Details

The vulnerability exists in Netty's HttpObjectDecoder.java in versions prior to 4.1.44. Specifically, the decoder leniently handles HTTP request or response headers such that it permits a Content-Length header to be present alongside a second Content-Length header, or alongside a Transfer-Encoding header. This violates HTTP specifications which dictate that these headers, especially when combined or duplicated, should be treated with strict parsing rules to prevent ambiguity. This misinterpretation can lead to desynchronization between front-end and back-end servers, enabling HTTP request smuggling attacks or other header-based bypasses.

What is the Impact of CVE-2019-20445?

Successful exploitation may allow attackers to bypass security controls, inject arbitrary data, or achieve request smuggling, potentially leading to unauthorized access to information or services.

What is the Exploitability of CVE-2019-20445?

Exploitation primarily involves crafting malformed HTTP requests, which is generally a low-complexity task. No specific authentication or privilege requirements are mentioned, suggesting unauthenticated remote access is possible. The main prerequisite is that the vulnerable Netty version is in use and processing HTTP messages. There are no special conditions or constraints beyond the structure of the HTTP headers. The likelihood of exploitation increases if the application uses Netty in a deployment where HTTP request smuggling could yield significant results, such as behind reverse proxies or load balancers that may interpret malformed headers differently than the backend application.

What are the Known Public Exploits?

PoC Author Link Commentary
No known exploits

What are the Available Fixes for CVE-2019-20445?

Available Upgrade Options

  • io.netty:netty-handler
    • >4.0.0, <4.1.45 → Upgrade to 4.1.45

Struggling with dependency upgrades?

See how Resolved Security's drop-in replacements make it simple.

Book a demo

Additional Resources

What are Similar Vulnerabilities to CVE-2019-20445?

Similar Vulnerabilities: CVE-2021-38297 , CVE-2023-38545 , CVE-2023-45803 , CVE-2019-17567 , CVE-2020-13956