First published: Tue May 19 2015(Updated: )
A flaw was found in the way Netty’s CookieDecoder method validated cookie name and value characters. An attacker could use this flaw to bypass the httpOnly flag on sensitive cookies. Upstream patch: <a href="https://github.com/slandelle/netty/commit/800555417e77029dcf8a31d7de44f27b5a8f79b8">https://github.com/slandelle/netty/commit/800555417e77029dcf8a31d7de44f27b5a8f79b8</a> External References: <a href="https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass">https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass</a> <a href="http://engineering.linkedin.com/security/look-netty%E2%80%99s-recent-security-update-cve%C2%AD-2015%C2%AD-2156">http://engineering.linkedin.com/security/look-netty%E2%80%99s-recent-security-update-cve%C2%AD-2015%C2%AD-2156</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/netty | <3.9.8. | 3.9.8. |
redhat/netty | <3.10.3. | 3.10.3. |
Netty Netty | <=3.9.7 | |
Netty Netty | =3.10.0 | |
Netty Netty | =3.10.1 | |
Netty Netty | =3.10.2 | |
Netty Netty | =4.0.0 | |
Netty Netty | =4.0.1 | |
Netty Netty | =4.0.2 | |
Netty Netty | =4.0.3 | |
Netty Netty | =4.0.4 | |
Netty Netty | =4.0.5 | |
Netty Netty | =4.0.6 | |
Netty Netty | =4.0.7 | |
Netty Netty | =4.0.8 | |
Netty Netty | =4.0.9 | |
Netty Netty | =4.0.10 | |
Netty Netty | =4.0.11 | |
Netty Netty | =4.0.12 | |
Netty Netty | =4.0.13 | |
Netty Netty | =4.0.14 | |
Netty Netty | =4.0.15 | |
Netty Netty | =4.0.16 | |
Netty Netty | =4.0.17 | |
Netty Netty | =4.0.18 | |
Netty Netty | =4.0.19 | |
Netty Netty | =4.0.20 | |
Netty Netty | =4.0.21 | |
Netty Netty | =4.0.22 | |
Netty Netty | =4.0.23 | |
Netty Netty | =4.0.24 | |
Netty Netty | =4.0.25 | |
Netty Netty | =4.0.26 | |
Netty Netty | =4.0.27 | |
Netty Netty | =4.1.0-beta1 | |
Netty Netty | =4.1.0-beta2 | |
Netty Netty | =4.1.0-beta3 | |
Netty Netty | =4.1.0-beta4 | |
Lightbend Play Framework | =2.0-rc3 | |
Lightbend Play Framework | =2.0-rc4 | |
Lightbend Play Framework | =2.0-rc5 | |
Lightbend Play Framework | =2.0.2 | |
Lightbend Play Framework | =2.0.2-rc1 | |
Lightbend Play Framework | =2.0.2-rc2 | |
Lightbend Play Framework | =2.0.3 | |
Lightbend Play Framework | =2.0.3-rc1 | |
Lightbend Play Framework | =2.0.3-rc2 | |
Lightbend Play Framework | =2.0.4 | |
Lightbend Play Framework | =2.0.4-rc1 | |
Lightbend Play Framework | =2.0.4-rc2 | |
Lightbend Play Framework | =2.0.5 | |
Lightbend Play Framework | =2.0.5-rc1 | |
Lightbend Play Framework | =2.0.5-rc2 | |
Lightbend Play Framework | =2.0.6 | |
Lightbend Play Framework | =2.0.7 | |
Lightbend Play Framework | =2.0.8 | |
Lightbend Play Framework | =2.1.0 | |
Lightbend Play Framework | =2.1.1 | |
Lightbend Play Framework | =2.1.1-rc1 | |
Lightbend Play Framework | =2.2.0 | |
Lightbend Play Framework | =2.2.1 | |
Lightbend Play Framework | =2.2.2 | |
Lightbend Play Framework | =2.2.6 | |
Lightbend Play Framework | =2.3.0 | |
Lightbend Play Framework | =2.3.0-rc1 | |
Lightbend Play Framework | =2.3.0-rc2 | |
Lightbend Play Framework | =2.3.1 | |
Lightbend Play Framework | =2.3.2 | |
Lightbend Play Framework | =2.3.2-rc1 | |
Lightbend Play Framework | =2.3.2-rc2 | |
Lightbend Play Framework | =2.3.3 | |
Lightbend Play Framework | =2.3.4 | |
Lightbend Play Framework | =2.3.5 | |
Lightbend Play Framework | =2.3.6 | |
Lightbend Play Framework | =2.3.7 | |
Lightbend Play Framework | =2.3.8 | |
Playframework Play Framework | =2.0 | |
Playframework Play Framework | =2.0-beta | |
Playframework Play Framework | =2.0-rc1 | |
Playframework Play Framework | =2.0-rc2 | |
Playframework Play Framework | =2.0.1 | |
Playframework Play Framework | =2.1.1-2.9.x-backport | |
Playframework Play Framework | =2.1.1-rc1-2.9.x-backport | |
Playframework Play Framework | =2.1.1-rc2 | |
Playframework Play Framework | =2.1.2 | |
Playframework Play Framework | =2.1.2-rc1 | |
Playframework Play Framework | =2.1.2-rc2 | |
Playframework Play Framework | =2.1.3 | |
Playframework Play Framework | =2.1.3-rc1 | |
Playframework Play Framework | =2.1.3-rc2 | |
Playframework Play Framework | =2.1.4 | |
Playframework Play Framework | =2.1.4-rc1 | |
Playframework Play Framework | =2.1.4-rc2 | |
Playframework Play Framework | =2.1.5 | |
Playframework Play Framework | =2.1.6 | |
Playframework Play Framework | =2.1.6-rc1 | |
Playframework Play Framework | =2.2.0-m1 | |
Playframework Play Framework | =2.2.0-m2 | |
Playframework Play Framework | =2.2.0-m3 | |
Playframework Play Framework | =2.2.0-rc1 | |
Playframework Play Framework | =2.2.0-rc2 | |
Playframework Play Framework | =2.2.1-rc1 | |
Playframework Play Framework | =2.2.2-rc1 | |
Playframework Play Framework | =2.2.2-rc2 | |
Playframework Play Framework | =2.2.2-rc3 | |
Playframework Play Framework | =2.2.2-rc4 | |
Playframework Play Framework | =2.2.3 | |
Playframework Play Framework | =2.2.3-rc1 | |
Playframework Play Framework | =2.2.3-rc2 | |
Playframework Play Framework | =2.2.4 | |
Playframework Play Framework | =2.2.5 | |
Playframework Play Framework | =2.3-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2156 is a vulnerability in Netty and Play Framework that allows remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information.
CVE-2015-2156 has a severity rating of 7.5 (High).
Netty versions before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5, as well as Play Framework 2.x before 2.3.9, are affected by CVE-2015-2156.
A remote attacker can exploit CVE-2015-2156 by leveraging improper validation of cookie name and bypassing the httpOnly flag on cookies to obtain sensitive information.
Yes, you can find references for CVE-2015-2156 at the following links: [1] https://exchange.xforce.ibmcloud.com/vulnerabilities/103239 [2] https://www.ibm.com/support/pages/node/6520510 [3] https://nvd.nist.gov/vuln/detail/CVE-2015-2156.