Bug 1758619 (CVE-2019-16869) - CVE-2019-16869 netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
Summary: CVE-2019-16869 netty: HTTP request smuggling by mishandled whitespace before ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-16869
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1796325 1796326 1796327 1796328 1796329 1797640 1797641 1797642 1825805 1866335 1866342
Blocks: 1758604
TreeView+ depends on / blocked
 
Reported: 2019-10-04 15:50 UTC by Jonathan Christison
Modified: 2021-12-14 18:47 UTC (History)
76 users (show)

Fixed In Version: netty 4.1.42.Final
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.
Clone Of:
Environment:
Last Closed: 2019-11-15 00:51:24 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:3892 0 None None None 2019-11-14 21:18:48 UTC
Red Hat Product Errata RHSA-2019:3901 0 None None None 2019-11-18 14:41:13 UTC
Red Hat Product Errata RHSA-2020:0159 0 None None None 2020-01-21 02:56:37 UTC
Red Hat Product Errata RHSA-2020:0160 0 None None None 2020-01-21 03:46:46 UTC
Red Hat Product Errata RHSA-2020:0161 0 None None None 2020-01-21 03:21:58 UTC
Red Hat Product Errata RHSA-2020:0164 0 None None None 2020-01-21 02:24:06 UTC
Red Hat Product Errata RHSA-2020:0445 0 None None None 2020-02-06 08:36:16 UTC
Red Hat Product Errata RHSA-2020:0922 0 None None None 2020-03-23 08:23:08 UTC
Red Hat Product Errata RHSA-2020:1445 0 None None None 2020-04-14 13:05:31 UTC
Red Hat Product Errata RHSA-2020:2321 0 None None None 2020-05-26 16:09:49 UTC
Red Hat Product Errata RHSA-2020:2333 0 None None None 2020-05-28 15:59:22 UTC
Red Hat Product Errata RHSA-2020:3196 0 None None None 2020-07-29 06:07:32 UTC
Red Hat Product Errata RHSA-2020:3197 0 None None None 2020-07-29 06:22:34 UTC
Red Hat Product Errata RHSA-2021:3140 0 None None None 2021-08-11 18:22:21 UTC

Description Jonathan Christison 2019-10-04 15:50:39 UTC
Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.

References:

Upstream bug:
https://github.com/netty/netty/issues/9571
 
Upstream commit:
https://github.com/netty/netty/commit/39cafcb05c99f2aa9fce7e6597664c9ed6a63a95

Fixed upstream in version 4.1.42.Final:
https://netty.io/news/2019/09/25/4-1-42-Final.html

Comment 8 errata-xmlrpc 2019-11-14 21:18:46 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.5.0

Via RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892

Comment 9 Product Security DevOps Team 2019-11-15 00:51:24 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-16869

Comment 11 errata-xmlrpc 2019-11-18 14:41:11 UTC
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes Vert.x 3.8.3

Via RHSA-2019:3901 https://access.redhat.com/errata/RHSA-2019:3901

Comment 14 errata-xmlrpc 2020-01-21 02:24:04 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2020:0164 https://access.redhat.com/errata/RHSA-2020:0164

Comment 15 errata-xmlrpc 2020-01-21 02:56:34 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6

Via RHSA-2020:0159 https://access.redhat.com/errata/RHSA-2020:0159

Comment 16 errata-xmlrpc 2020-01-21 03:21:56 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 8

Via RHSA-2020:0161 https://access.redhat.com/errata/RHSA-2020:0161

Comment 17 errata-xmlrpc 2020-01-21 03:46:44 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7

Via RHSA-2020:0160 https://access.redhat.com/errata/RHSA-2020:0160

Comment 18 Jonathan Christison 2020-01-24 10:58:14 UTC
Mitigation:

* Use HTTP/2 instead (clear boundaries between requests)
* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings

Comment 23 Yadnyawalk Tale 2020-02-04 05:23:38 UTC
Statement:

OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we're reducing the impact of this issue to moderate and may fix it in the future release.

Red Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.

[1]  https://github.com/elastic/elasticsearch/issues/49396

Comment 24 errata-xmlrpc 2020-02-06 08:36:07 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On

Via RHSA-2020:0445 https://access.redhat.com/errata/RHSA-2020:0445

Comment 31 errata-xmlrpc 2020-03-23 08:22:58 UTC
This issue has been addressed in the following products:

  Red Hat AMQ

Via RHSA-2020:0922 https://access.redhat.com/errata/RHSA-2020:0922

Comment 32 errata-xmlrpc 2020-04-14 13:05:26 UTC
This issue has been addressed in the following products:

  Red Hat AMQ 7.4.3

Via RHSA-2020:1445 https://access.redhat.com/errata/RHSA-2020:1445

Comment 34 errata-xmlrpc 2020-05-26 16:09:45 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid 7.3.6

Via RHSA-2020:2321 https://access.redhat.com/errata/RHSA-2020:2321

Comment 35 errata-xmlrpc 2020-05-28 15:59:18 UTC
This issue has been addressed in the following products:

  EAP-CD 19 Tech Preview

Via RHSA-2020:2333 https://access.redhat.com/errata/RHSA-2020:2333

Comment 36 errata-xmlrpc 2020-07-29 06:07:28 UTC
This issue has been addressed in the following products:

  Red Hat Decision Manager

Via RHSA-2020:3196 https://access.redhat.com/errata/RHSA-2020:3196

Comment 37 errata-xmlrpc 2020-07-29 06:22:30 UTC
This issue has been addressed in the following products:

  Red Hat Process Automation

Via RHSA-2020:3197 https://access.redhat.com/errata/RHSA-2020:3197

Comment 38 Jonathan Christison 2020-08-03 09:18:46 UTC
Marking Red Hat Jboss Fuse 6 as having a moderate impact, Fuse 6 distributes affected versions of Netty, however its use in Fuse 6 fabric-gateway is not susceptible to the vulnerability as the fabric-gateway will create a new http client upon each gateway invocation, this means there is no multiplexing of connections, this is a prerequisite of HTTP smuggling/desynchronisation attacks.

 This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Fuse 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 41 Jonathan Christison 2021-06-01 16:44:21 UTC
Marking Red Hat Fuse 7 as having a low impact, Fuse 7 distributes affected versions of Netty in the Karaf Narayana transaction manager, however the vulnerable functionality of these artifacts is not used.

Comment 43 errata-xmlrpc 2021-08-11 18:22:17 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.9

Via RHSA-2021:3140 https://access.redhat.com/errata/RHSA-2021:3140


Note You need to log in before you can comment on or make changes to this bug.