CWE
444
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2021-21409: Possible request smuggling in HTTP/2 due missing validation of content-length

First published: Tue Mar 30 2021(Updated: )

### Impact The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case. ### Patches This was fixed as part of 4.1.61.Final ### Workarounds Validation can be done by the user before proxy the request by validating the header.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
maven/io.netty:netty<4.0.0
maven/org.jboss.netty:netty<4.0.0
maven/io.netty:netty-codec-http2>=4.0.0<4.1.61.Final
4.1.61.Final
redhat/qpid-proton<0:0.33.0-6.el7_9
0:0.33.0-6.el7_9
redhat/qpid-proton<0:0.33.0-8.el8
0:0.33.0-8.el8
redhat/eap7-elytron-web<0:1.6.3-1.Final_redhat_00001.1.el6ea
0:1.6.3-1.Final_redhat_00001.1.el6ea
redhat/eap7-hal-console<0:3.2.15-1.Final_redhat_00001.1.el6ea
0:3.2.15-1.Final_redhat_00001.1.el6ea
redhat/eap7-hibernate<0:5.3.20-3.SP1_redhat_00001.1.el6ea
0:5.3.20-3.SP1_redhat_00001.1.el6ea
redhat/eap7-infinispan<0:9.4.23-1.Final_redhat_00001.1.el6ea
0:9.4.23-1.Final_redhat_00001.1.el6ea
redhat/eap7-ironjacamar<0:1.4.33-1.Final_redhat_00001.1.el6ea
0:1.4.33-1.Final_redhat_00001.1.el6ea
redhat/eap7-jberet<0:1.3.8-1.Final_redhat_00001.1.el6ea
0:1.3.8-1.Final_redhat_00001.1.el6ea
redhat/eap7-jboss-remoting<0:5.0.23-1.Final_redhat_00001.1.el6ea
0:5.0.23-1.Final_redhat_00001.1.el6ea
redhat/eap7-jboss-server-migration<0:1.7.2-7.Final_redhat_00008.1.el6ea
0:1.7.2-7.Final_redhat_00008.1.el6ea
redhat/eap7-netty<0:4.1.63-1.Final_redhat_00001.1.el6ea
0:4.1.63-1.Final_redhat_00001.1.el6ea
redhat/eap7-undertow<0:2.0.38-1.SP1_redhat_00001.1.el6ea
0:2.0.38-1.SP1_redhat_00001.1.el6ea
redhat/eap7-wildfly<0:7.3.8-1.GA_redhat_00001.1.el6ea
0:7.3.8-1.GA_redhat_00001.1.el6ea
redhat/eap7-wildfly-elytron<0:1.10.13-1.Final_redhat_00001.1.el6ea
0:1.10.13-1.Final_redhat_00001.1.el6ea
redhat/eap7-wildfly-http-client<0:1.0.28-1.Final_redhat_00001.1.el6ea
0:1.0.28-1.Final_redhat_00001.1.el6ea
redhat/eap7-elytron-web<0:1.6.3-1.Final_redhat_00001.1.el7ea
0:1.6.3-1.Final_redhat_00001.1.el7ea
redhat/eap7-hal-console<0:3.2.15-1.Final_redhat_00001.1.el7ea
0:3.2.15-1.Final_redhat_00001.1.el7ea
redhat/eap7-hibernate<0:5.3.20-3.SP1_redhat_00001.1.el7ea
0:5.3.20-3.SP1_redhat_00001.1.el7ea
redhat/eap7-infinispan<0:9.4.23-1.Final_redhat_00001.1.el7ea
0:9.4.23-1.Final_redhat_00001.1.el7ea
redhat/eap7-ironjacamar<0:1.4.33-1.Final_redhat_00001.1.el7ea
0:1.4.33-1.Final_redhat_00001.1.el7ea
redhat/eap7-jberet<0:1.3.8-1.Final_redhat_00001.1.el7ea
0:1.3.8-1.Final_redhat_00001.1.el7ea
redhat/eap7-jboss-remoting<0:5.0.23-1.Final_redhat_00001.1.el7ea
0:5.0.23-1.Final_redhat_00001.1.el7ea
redhat/eap7-jboss-server-migration<0:1.7.2-7.Final_redhat_00008.1.el7ea
0:1.7.2-7.Final_redhat_00008.1.el7ea
redhat/eap7-netty<0:4.1.63-1.Final_redhat_00001.1.el7ea
0:4.1.63-1.Final_redhat_00001.1.el7ea
redhat/eap7-undertow<0:2.0.38-1.SP1_redhat_00001.1.el7ea
0:2.0.38-1.SP1_redhat_00001.1.el7ea
redhat/eap7-wildfly<0:7.3.8-1.GA_redhat_00001.1.el7ea
0:7.3.8-1.GA_redhat_00001.1.el7ea
redhat/eap7-wildfly-elytron<0:1.10.13-1.Final_redhat_00001.1.el7ea
0:1.10.13-1.Final_redhat_00001.1.el7ea
redhat/eap7-wildfly-http-client<0:1.0.28-1.Final_redhat_00001.1.el7ea
0:1.0.28-1.Final_redhat_00001.1.el7ea
redhat/eap7-elytron-web<0:1.6.3-1.Final_redhat_00001.1.el8ea
0:1.6.3-1.Final_redhat_00001.1.el8ea
redhat/eap7-hal-console<0:3.2.15-1.Final_redhat_00001.1.el8ea
0:3.2.15-1.Final_redhat_00001.1.el8ea
redhat/eap7-hibernate<0:5.3.20-3.SP1_redhat_00001.1.el8ea
0:5.3.20-3.SP1_redhat_00001.1.el8ea
redhat/eap7-infinispan<0:9.4.23-1.Final_redhat_00001.1.el8ea
0:9.4.23-1.Final_redhat_00001.1.el8ea
redhat/eap7-ironjacamar<0:1.4.33-1.Final_redhat_00001.1.el8ea
0:1.4.33-1.Final_redhat_00001.1.el8ea
redhat/eap7-jberet<0:1.3.8-1.Final_redhat_00001.1.el8ea
0:1.3.8-1.Final_redhat_00001.1.el8ea
redhat/eap7-jboss-remoting<0:5.0.23-1.Final_redhat_00001.1.el8ea
0:5.0.23-1.Final_redhat_00001.1.el8ea
redhat/eap7-jboss-server-migration<0:1.7.2-7.Final_redhat_00008.1.el8ea
0:1.7.2-7.Final_redhat_00008.1.el8ea
redhat/eap7-netty<0:4.1.63-1.Final_redhat_00001.1.el8ea
0:4.1.63-1.Final_redhat_00001.1.el8ea
redhat/eap7-undertow<0:2.0.38-1.SP1_redhat_00001.1.el8ea
0:2.0.38-1.SP1_redhat_00001.1.el8ea
redhat/eap7-wildfly<0:7.3.8-1.GA_redhat_00001.1.el8ea
0:7.3.8-1.GA_redhat_00001.1.el8ea
redhat/eap7-wildfly-elytron<0:1.10.13-1.Final_redhat_00001.1.el8ea
0:1.10.13-1.Final_redhat_00001.1.el8ea
redhat/eap7-wildfly-http-client<0:1.0.28-1.Final_redhat_00001.1.el8ea
0:1.0.28-1.Final_redhat_00001.1.el8ea
redhat/candlepin<0:4.1.13-1.el7
0:4.1.13-1.el7
redhat/candlepin<0:4.1.13-1.el8
0:4.1.13-1.el8
redhat/netty-codec-http<4.1.61.
4.1.61.
debian/netty
1:4.1.48-4+deb11u2
1:4.1.48-7+deb12u1
1:4.1.48-10
NettyRPC<4.1.61
Debian Linux=10.0
NetApp OnCommand API Services
NetApp OnCommand Workflow Automation
Oracle Banking Corporate Lending=14.2.0
Oracle Banking Corporate Lending=14.3.0
Oracle Banking Corporate Lending=14.5.0
Oracle Banking Credit Facilities Process Management=14.2.0
Oracle Banking Credit Facilities Process Management=14.3.0
Oracle Banking Credit Facilities Process Management=14.5.0
Oracle Banking Trade Finance Process Management=14.2.0
Oracle Banking Trade Finance Process Management=14.3.0
Oracle Banking Trade Finance Process Management=14.5.0
Oracle Coherence=12.2.1.4.0
Oracle Coherence=14.1.1.0.0
Oracle Communications Billing and Revenue Management Elastic Charging Engine=12.0.0.3
Oracle Communications Cloud Native Core Console=1.7.0
Oracle Communications Cloud Native Core Policy=1.14.0
Oracle Communications Design Studio=7.4.2.0.0
Sun iPlanet Messaging Server=8.1
Oracle Helidon=1.4.10
Oracle Helidon=2.4.0
Oracle JD Edwards EnterpriseOne Tools<9.2.6.3
Oracle NoSQL Database<21.1.12
Oracle Primavera Gateway>=17.12.0<=17.12.11
Oracle Primavera Gateway>=18.8.0<=18.8.11
Oracle Primavera Gateway>=19.12.0<=19.12.10
Red Hat Quarkus<=1.13.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2021-21409?

    CVE-2021-21409 has been classified as a high severity vulnerability due to its potential for causing request smuggling.

  • How do I fix CVE-2021-21409?

    To remediate CVE-2021-21409, update to Netty version 4.1.61.Final or later.

  • Which software is affected by CVE-2021-21409?

    CVE-2021-21409 affects various Netty and JBoss packages, particularly those below version 4.1.61.

  • What type of vulnerability is CVE-2021-21409?

    CVE-2021-21409 is a request smuggling vulnerability that arises from improper validation of the content-length header.

  • Can CVE-2021-21409 lead to further exploits?

    Yes, CVE-2021-21409 can be exploited to facilitate other attacks if requests are proxied to remote servers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203