Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.
Path to vulnerable library: /epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar,/epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar,/epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar,/epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar
Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.
CVE-2015-2156 - High Severity Vulnerability
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.
Library home page: http://netty.io/
Path to dependency file: /example/pom.xml
Path to vulnerable library: /epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar,/epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar,/epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar,/epository/io/netty/netty-codec-http/4.1.0.Beta1/netty-codec-http-4.1.0.Beta1.jar
Dependency Hierarchy: - :x: **netty-codec-http-4.1.0.Beta1.jar** (Vulnerable Library)
Found in HEAD commit: 349543fa7012e8d0f84182eb672766e12d70eac3
Found in base branch: master
Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.
Publish Date: 2017-10-18
URL: CVE-2015-2156
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2156
Release Date: 2017-10-18
Fix Resolution: 4.1.0.Beta5
Step up your Open Source Security Game with Mend here