CVE-2025-67735

Data: 2026-01-06

Severity: Medium

CVSS Score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Riferimenti:

Libreria: io.netty:netty-transport < 4.1.129.Final e < 4.2.8.Final

Descrizione

[CVE-2025-67735] CWE-93: Improper Neutralization of CRLF Sequences (“CRLF Injection”)

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the io.netty.handler.codec.http.HttpRequestEncoder has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when HttpRequestEncoder is used without proper sanitization of the URI. Any application / framework using HttpRequestEncoder can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

GovWay

Versione affette:

  • 3.3.x: <= 3.3.18

  • 3.4.x: <= 3.4.1.p1

Risoluzione:

  • 3.3.x: 3.3.19

  • 3.4.x: 3.4.2