Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.
Path to dependency file: /chaincode/simple/java/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-common/4.1.38.Final/6f8aae763f743d91fb1ba1e9011dae0ef4f6ff34/netty-common-4.1.38.Final.jar
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.
CVE-2024-47535 - Medium Severity Vulnerability
Vulnerable Library - netty-common-4.1.38.Final.jar
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.
Library home page: https://netty.io/
Path to dependency file: /chaincode/simple/java/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-common/4.1.38.Final/6f8aae763f743d91fb1ba1e9011dae0ef4f6ff34/netty-common-4.1.38.Final.jar
Dependency Hierarchy: - fabric-chaincode-shim-1.4.8.jar (Root Library) - fabric-chaincode-protos-1.4.8.jar - grpc-netty-1.23.0.jar - netty-codec-http2-4.1.38.Final.jar - :x: **netty-common-4.1.38.Final.jar** (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.
Publish Date: 2024-11-12
URL: CVE-2024-47535
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-xq3w-v528-46rv
Release Date: 2024-11-12
Fix Resolution (io.netty:netty-common): 4.1.115.Final
Direct dependency fix Resolution (org.hyperledger.fabric-chaincode-java:fabric-chaincode-shim): 2.2.1
Step up your Open Source Security Game with Mend here