opentok / Opentok-Java-SDK

OpenTok Server SDK for Java
https://tokbox.com/developer
MIT License
27 stars 64 forks source link

netty-codec-http-4.1.104.Final.jar: 1 vulnerabilities (highest severity is: 5.3) #253

Closed mend-for-github-com[bot] closed 6 months ago

mend-for-github-com[bot] commented 7 months ago
Vulnerable Library - netty-codec-http-4.1.104.Final.jar

Found in HEAD commit: a46d335ceb24552a30e5bdfb5817a5b394d02644

Oops, something went wrong. We couldn’t find a fix. Support token-14229670b051e47588c479e89093ee9681713636000052_1304

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (netty-codec-http version) Fix PR available Reachability
CVE-2024-29025 Medium 5.3 Not Defined 0.0% netty-codec-http-4.1.104.Final.jar Direct N/A

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-29025 ### Vulnerable Library - netty-codec-http-4.1.104.Final.jar

Dependency Hierarchy: - :x: **netty-codec-http-4.1.104.Final.jar** (Vulnerable Library)

Found in HEAD commit: a46d335ceb24552a30e5bdfb5817a5b394d02644

Found in base branch: main

### Vulnerability Details

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.

Publish Date: 2024-03-25

URL: CVE-2024-29025

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.0%

### CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-29025

Release Date: 2024-03-25

Fix Resolution: io.netty:netty-codec-http:4.1.108.Final

SMadani commented 6 months ago

Using 4.1.109