CVE-2025-67735
Data: 2026-01-06
Severity: Medium
CVSS Score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Riferimenti:
Libreria: io.netty:netty-transport < 4.1.129.Final e < 4.2.8.Final
Descrizione
[CVE-2025-67735] CWE-93: Improper Neutralization of CRLF Sequences (“CRLF Injection”)
Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the io.netty.handler.codec.http.HttpRequestEncoder has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when HttpRequestEncoder is used without proper sanitization of the URI. Any application / framework using HttpRequestEncoder can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.
GovWay
Versione affette:
3.3.x: <= 3.3.18
3.4.x: <= 3.4.1.p1
Risoluzione:
3.3.x: 3.3.19
3.4.x: 3.4.2