← Zuruck zu CVEs
CVE-2026-42578
N/ABeschreibung
Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's HttpProxyHandler constructs HTTP CONNECT requests with header validation explicitly disabled. The newInitialMessage() method creates headers using DefaultHttpHeadersFactory.headersFactory().withValidation(false), then adds user-provided outboundHeaders without any CRLF validation. This allows an attacker who can influence the outbound headers to inject arbitrary HTTP headers into the CONNECT request sent to the proxy server. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht5/13/2026
Zuletzt geandert5/13/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-113
Referenzen
https://github.com/netty/netty/security/advisories/GHSA-45q3-82m4-75jr(security-advisories@github.com)
https://github.com/netty/netty/security/advisories/GHSA-45q3-82m4-75jr(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.