
Cloud Vulnerability DB
A community-led vulnerabilities database
Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled (Snyk Advisory). The vulnerability was disclosed and published on February 18, 2020, and is tracked as CVE-2019-10797.
The vulnerability has been assigned a CVSS v3.1 base score of 6.3 (Medium severity). The attack vector is network-based, with low attack complexity and no privileges required. However, user interaction is required for successful exploitation. The vulnerability affects the confidentiality, integrity, and availability of the system, all with low impact ratings (Snyk Advisory).
The vulnerability can lead to HTTP Response Splitting attacks due to disabled HTTP Header validation. This can result in some loss of confidentiality where restricted information might be accessed, potential modification of data with limited control over the consequences, and possible interruptions in resource availability (Snyk Advisory).
The recommended mitigation is to upgrade org.wso2.transport.http:org.wso2.transport.http.netty to version 6.3.1 or higher (Snyk Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."