Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.
References
Link | Resource |
---|---|
https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding | Technical Description |
https://github.com/JLLeitschuh/unCVEed/issues/1 | Third Party Advisory Issue Tracking |
https://github.com/netty/netty/commit/edb55fd8e0a3bcbd85881e423464f585183d1284 | Patch |
https://github.com/netty/netty/issues/15522 | Issue Tracking |
https://github.com/netty/netty/pull/15611 | Issue Tracking Patch |
https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49 | Exploit Vendor Advisory |
https://w4ke.info/2025/06/18/funky-chunks.html | Broken Link |
Configurations
Configuration 1 (hide)
|
History
08 Sep 2025, 16:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding - Technical Description | |
References | () https://github.com/JLLeitschuh/unCVEed/issues/1 - Third Party Advisory, Issue Tracking | |
References | () https://github.com/netty/netty/commit/edb55fd8e0a3bcbd85881e423464f585183d1284 - Patch | |
References | () https://github.com/netty/netty/issues/15522 - Issue Tracking | |
References | () https://github.com/netty/netty/pull/15611 - Issue Tracking, Patch | |
References | () https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49 - Exploit, Vendor Advisory | |
References | () https://w4ke.info/2025/06/18/funky-chunks.html - Broken Link | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:* | |
First Time |
Netty
Netty netty |
03 Sep 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-03 21:15
Updated : 2025-09-08 16:46
NVD link : CVE-2025-58056
Mitre link : CVE-2025-58056
CVE.ORG link : CVE-2025-58056
JSON object : View
Products Affected
netty
- netty
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')