Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jboss.resteasy/resteasy-netty4-cdi
  4. ›
  5. CVE-2024-9622

CVE-2024-9622: HTTP Request Smuggling Leading to Client Timeouts in resteasy-netty4

October 8, 2024

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

References

  • access.redhat.com/security/cve/CVE-2024-9622
  • bugzilla.redhat.com/show_bug.cgi?id=2317179
  • github.com/advisories/GHSA-5wpr-cj9p-959r
  • github.com/orgs/resteasy/discussions/4351
  • github.com/resteasy/resteasy
  • nvd.nist.gov/vuln/detail/CVE-2024-9622

Code Behaviors & Features

Detect and mitigate CVE-2024-9622 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions

Solution

Unfortunately, there is no solution available yet.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Source file

maven/org.jboss.resteasy/resteasy-netty4-cdi/CVE-2024-9622.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:26 +0000.