Miggo Logo

CVE-2023-4586:
Withdrawn Advisory: Netty-handler does not validate host names by default

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.28545%
Published
10/4/2023
Updated
11/10/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.netty:netty-handlermaven>= 4.1.0.Final, <= 4.1.99.Final

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Netty's default SSL/TLS configuration not enabling hostname validation. The critical point of failure is the initialization of the SSLEngine via SslContext.newEngine, which does not set the endpoint identification algorithm to 'HTTPS' in SSLParameters. This omission bypasses certificate hostname validation. The advisory explicitly states that users must manually configure SSLParameters with 'HTTPS' to mitigate this, confirming that the default engine creation logic is the root cause. The function SslContext.newEngine is directly responsible for SSLEngine initialization in Netty, making it the primary vulnerable function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Wit**r*wn **visory T*is **visory **s ***n wit**r*wn ****us* t** un**rlyin* vuln*r**ility only *on**rns R** **t's *ot Ro* *li*nt, w*i** is not in on* o* t** *it*u* **visory **t***s*'s [support** **osyst*ms](*ttps://*it*u*.*om/*it*u*/**visory-**t***

Reasoning

T** vuln*r**ility st*ms *rom N*tty's ****ult SSL/TLS *on*i*ur*tion not *n**lin* *ostn*m* v*li**tion. T** *riti**l point o* **ilur* is t** initi*liz*tion o* t** SSL*n*in* vi* Ssl*ont*xt.n*w*n*in*, w*i** *o*s not s*t t** *n*point i**nti*i**tion *l*orit