First published: Tue Nov 28 2023(Updated: )
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Reactor Netty | <1.0.39 | |
Pivotal Reactor Netty | >=1.1.0<1.1.13 | |
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
IBM Security Guardium | <=12.0 | |
maven/io.projectreactor.netty:reactor-netty-core | >=1.0.0<1.0.39 | 1.0.39 |
maven/io.projectreactor.netty:reactor-netty-core | >=1.1.0<1.1.13 | 1.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-34054.
The title of this vulnerability is Reactor Netty HTTP Server Metrics DoS Vulnerability.
The severity of CVE-2023-34054 is medium, with a severity value of 5.3.
CVE-2023-34054 affects versions 1.0.x prior to 1.0.39 and versions 1.1.x prior to 1.1.13 of Reactor Netty HTTP Server.
To fix CVE-2023-34054, update Reactor Netty HTTP Server to version 1.0.39 or higher if using version 1.0.x, or update to version 1.1.13 or higher if using version 1.1.x.