CVE-2026-41417

Source
https://cve.org/CVERecord?id=CVE-2026-41417
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-41417.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-41417
Aliases
Downstream
Related
Published
2026-05-06T20:52:47.206Z
Modified
2026-05-18T06:00:09.333865495Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Netty vulnerable to HTTP request smuggling and RTSP request injection via DefaultHttpRequest.setUri()
Details

Netty allows request-line validation to be bypassed when a DefaultHttpRequest or DefaultFullHttpRequest is created first and its URI is later changed via setUri(). The constructors reject CRLF and whitespace characters that would break the start-line, but setUri() does not apply the same validation. HttpRequestEncoder and RtspEncoder then write the URI into the request line verbatim. If attacker-controlled input reaches setUri(), this enables CRLF injection and insertion of additional HTTP or RTSP requests, leading to HTTP request smuggling or desynchronization on the HTTP side and request injection on the RTSP side. This issue is fixed in versions 4.2.13.Final and 4.1.133.Final.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/41xxx/CVE-2026-41417.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-444",
        "CWE-93"
    ]
}
References

Affected packages

Git / github.com/netty/netty

Affected ranges

Type
GIT
Repo
https://github.com/netty/netty
Events

Affected versions

netty-4.*
netty-4.2.0.Alpha1
netty-4.2.0.Alpha2
netty-4.2.0.Alpha3
netty-4.2.0.Alpha4
netty-4.2.0.Alpha5
netty-4.2.0.Beta1
netty-4.2.0.Final
netty-4.2.0.RC1
netty-4.2.0.RC2
netty-4.2.0.RC3
netty-4.2.0.RC4
netty-4.2.1.Final
netty-4.2.10.Final
netty-4.2.11.Final
netty-4.2.12.Final
netty-4.2.2.Final
netty-4.2.3.Final
netty-4.2.4.Final
netty-4.2.5.Final
netty-4.2.6.Final
netty-4.2.7.Final
netty-4.2.8.Final
netty-4.2.9.Final

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-41417.json"