CVE-2021-21290

Published on: 02/08/2021 12:00:00 AM UTC

Last Modified on: 05/12/2022 02:33:00 PM UTC

CVE-2021-21290 - advisory for GHSA-5mcr-gq6c-3hq2

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Certain versions of Karaf from Apache contain the following vulnerability:

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involving an insecure temp file. When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method "File.createTempFile" on unix-like systems creates a random file, but, by default will create this file with the permissions "-rw-r--r--". Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's "AbstractDiskHttpData" is vulnerable. This has been fixed in version 4.1.59.Final. As a workaround, one may specify your own "java.io.tmpdir" when you start the JVM or use "DefaultHttpDataFactory.setBaseDir(...)" to set the directory to something that is only readable by the current user.

  • CVE-2021-21290 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • Affected Vendor/Software: URL Logo netty - netty version < 4.1.59.Final

CVSS3 Score: 5.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 1.9 - LOW

Access
Vector
Access
Complexity
Authentication
LOCAL MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [zookeeper-issues] 20210330 [jira] [Updated] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-commits] 20210302 [kafka] branch 2.6 updated: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290
Debian -- Security Information -- DSA-4885-1 netty www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-4885
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [pulsar-commits] 20210329 [GitHub] [pulsar] yaswanthnadella opened a new issue #10071: CVE-2021-21295 & CVE-2021-21290
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-commits] 20210302 [kafka] branch 2.7 updated: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [pulsar-commits] 20210329 [GitHub] [pulsar] aahmed-se opened a new pull request #10073: Upgrade Netty version to 4.1.60.final
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [zookeeper-issues] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [zookeeper-dev] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [bookkeeper-issues] 20210330 [GitHub] [bookkeeper] eolivelli opened a new issue #2669: Update Netty to 4.1.60.final
Oracle Critical Patch Update Advisory - April 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuapr2022.html
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [kafka-dev] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [activemq-users] 20210715 Next ActiveMQ Artemis Release - CVE-2021-21290 vulnerability
Use Files.createTempFile(...) to ensure the file is created with prop… · netty/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo MISC github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec
Oracle Critical Patch Update Advisory - July 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com//security-alerts/cpujul2021.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [zookeeper-dev] 20210330 [jira] [Created] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
Pony Mail! Mailing List
Patch
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-dev] 20210301 [jira] [Created] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [ranger-dev] 20210317 [jira] [Created] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295
Oracle Critical Patch Update Advisory - October 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuoct2021.html
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr opened a new pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [zookeeper-issues] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-dev] 20210302 [jira] [Resolved] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290
Pony Mail! Mailing List
Patch
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210301 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290
[SECURITY] [DLA 2555-1] netty security update Mailing List
Third Party Advisory
lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20210211 [SECURITY] [DLA 2555-1] netty security update
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [tinkerpop-dev] 20210316 [jira] [Created] (TINKERPOP-2535) Netty 4.1.52 flagged as medium security violation
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [pulsar-commits] 20210329 [GitHub] [pulsar] merlimat closed issue #10071: CVE-2021-21295 & CVE-2021-21290
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [pulsar-commits] 20211020 [GitHub] [pulsar] Shoothzj opened a new pull request #12437: [Security] Bump grpc to 1.41.0
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210302 [GitHub] [kafka] omkreddy closed pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290
Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files · Advisory · netty/netty · GitHub Exploit
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [ranger-dev] 20210317 [jira] [Assigned] (RANGER-3209) Upgrade netty to 4.1.60+ due to CVE-2021-21290 and CVE-2021-21295
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [zookeeper-issues] 20210402 [jira] [Commented] (ZOOKEEPER-4272) Upgrade Netty library to > 4.1.60 due to security vulnerability CVE-2021-21295
Pony Mail! Mailing List
Patch
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210301 [jira] [Created] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210330 [jira] [Created] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210302 [jira] [Resolved] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290
Oracle Critical Patch Update Advisory - April 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuApr2021.html
CVE-2021-21290 Apache Netty Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20220210-0011/
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210330 [jira] [Updated] (KAFKA-12583) Upgrade of netty-codec due to CVE-2021-21295
Pony Mail! Mailing List
Third Party Advisory
lists.apache.org
text/html
URL Logo MLIST [kafka-jira] 20210301 [jira] [Assigned] (KAFKA-12389) Upgrade of netty-codec due to CVE-2021-21290

Related QID Numbers

  • 178527 Debian Security Update for netty (DSA 4885-1)
  • 180593 Debian Security Update for netty (CVE-2021-21290)
  • 239353 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.7 (RHSA-2021:2048)
  • 239354 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.7 (RHSA-2021:2047)
  • 239355 Red Hat Update for Red Hat JBoss Enterprise Application Platform 7.3.7 (RHSA-2021:2046)
  • 239741 Red Hat Update for amq clients 2.9.1 release and (RHSA-2021:1511)
  • 240012 Red Hat Update for Satellite "6\\.10" (RHSA-2022:0190)
  • 240566 Red Hat Update for Satellite 6.11 Release (RHSA-2022:5498)
  • 375720 Oracle PeopleSoft Enterprise PeopleTools Product Multiple Vulnerabilities (CPUJUL2021)
  • 960505 Rocky Linux Security Update for Satellite (RLSA-2022:5498)
  • 980333 Java (maven) Security Update for io.netty:netty-codec-http (GHSA-5mcr-gq6c-3hq2)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheKaraf2.7.0AllAllAll
Operating
System
DebianDebian Linux10.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
ApplicationNetappActive Iq Unified Manager-AllAllAll
ApplicationNetappActive Iq Unified Manager-AllAllAll
ApplicationNetappCloud Secure Agent-AllAllAll
ApplicationNetappSnapcenter-AllAllAll
ApplicationNettyNettyAllAllAllAll
ApplicationNettyNettyAllAllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.2.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.3.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.5.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.2.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.3.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.5.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.2.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.3.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.5.0AllAllAll
ApplicationOracleCommunications Brm - Elastic Charging Engine12.0.0.3AllAllAll
ApplicationOracleCommunications Design Studio7.4.2AllAllAll
ApplicationOracleCommunications Messaging Server8.1AllAllAll
ApplicationOracleNosql DatabaseAllAllAllAll
ApplicationQuarkusQuarkusAllAllAllAll
  • cpe:2.3:a:apache:karaf:2.7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*:
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*:
  • cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Reddit Logo Icon /r/PowerShell extract regex returns to many options 2022-01-14 16:32:20
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report