Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response.
Impact
- Cross-User Defacement
- Cache Poisoning
- Cross-Site Scripting (XSS)
- Page Hijacking
Root Cause
The root cause is due to the usage of Netty without the HTTP header validation.
|
static final DefaultHttpHeaders EMPTY = new DefaultHttpHeaders(false); |
Patches
This vulnerability has been patched in 0.97.0.
References
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
GHSA-mvqp-q37c-wf9j
For more information
If you have any questions or comments about this advisory:
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response.
Impact
Root Cause
The root cause is due to the usage of Netty without the HTTP header validation.
armeria/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java
Line 23 in f0d870f
Patches
This vulnerability has been patched in 0.97.0.
References
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
GHSA-mvqp-q37c-wf9j
For more information
If you have any questions or comments about this advisory: