Skip to content

[DOC] Add CWE-113 warning to DefaultHttpHeaders constructor#9646

Merged
normanmaurer merged 2 commits intonetty:4.1from
JLLeitschuh:doc/JLL/defaultHttpHeadersWarning
Oct 10, 2019
Merged

[DOC] Add CWE-113 warning to DefaultHttpHeaders constructor#9646
normanmaurer merged 2 commits intonetty:4.1from
JLLeitschuh:doc/JLL/defaultHttpHeadersWarning

Conversation

@JLLeitschuh
Copy link
Copy Markdown
Contributor

Motivation:

I've now found two libraries that use Netty to be vulnerable to CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') due to using new DefaultHttpHeaders(false).

Some part of me hopes that this warning will help dissuade library authors from disabling this important security check.

Modification:

Add documentation to DefaultHttpHeaders(boolean) to warn about the implications of false.

Result:

This improves the documentation on DefaultHttpHeaders.

I'm not at all attached to the wording, but I think that something should be added.

@JLLeitschuh JLLeitschuh changed the title Add CWE-113 warning to DefaultHttpHeaders constructor [DOC] Add CWE-113 warning to DefaultHttpHeaders constructor Oct 8, 2019
@netty-bot
Copy link
Copy Markdown

Can one of the admins verify this patch?

@normanmaurer
Copy link
Copy Markdown
Member

@netty-bot test this please

@normanmaurer normanmaurer requested a review from slandelle October 8, 2019 17:04
@normanmaurer normanmaurer added this to the 4.1.43.Final milestone Oct 9, 2019
@normanmaurer
Copy link
Copy Markdown
Member

@JLLeitschuh can you please sign our ICLA and let me know once done:

https://netty.io/s/icla

@JLLeitschuh
Copy link
Copy Markdown
Contributor Author

Done.

@normanmaurer
Copy link
Copy Markdown
Member

@netty-bot test this please

@normanmaurer normanmaurer merged commit e0b15ed into netty:4.1 Oct 10, 2019
@normanmaurer
Copy link
Copy Markdown
Member

@JLLeitschuh thanks a lot!

normanmaurer pushed a commit that referenced this pull request Oct 10, 2019
### Motivation:

I've now found two libraries that use Netty to be vulnerable to [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) due to using `new DefaultHttpHeaders(false)`.

Some part of me hopes that this warning will help dissuade library authors from disabling this important security check.

### Modification:

Add documentation to `DefaultHttpHeaders(boolean)` to warn about the implications of `false`.

### Result:

This improves the documentation on `DefaultHttpHeaders`.
@JLLeitschuh
Copy link
Copy Markdown
Contributor Author

You're welcome! Thanks for the quick turnaround!

@JLLeitschuh
Copy link
Copy Markdown
Contributor Author

Related:
github/codeql#2192

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants