Wiz Agents & Workflows are here

CVE-2021-21295
Java vulnerability analysis and mitigation

Overview

Netty, an open-source asynchronous event-driven network application framework, was found to contain a request smuggling vulnerability (CVE-2021-21295) in versions before 4.1.60.Final. The vulnerability was discovered in March 2021 and affects the io.netty:netty-codec-http2 component (GitHub Advisory, NVD).

Technical details

The vulnerability occurs when a Content-Length header is present in the original HTTP/2 request but is not validated by Http2MultiplexHandler as it is propagated up. While this is acceptable for direct HTTP/2 communication, problems arise when the request is converted to HTTP/1.1 objects via Http2StreamFrameToHttpObjectCodec and then proxied to another peer. The vulnerability is only exploitable when all of the following conditions are met: HTTP2MultiplexCodec or Http2FrameCodec is used, Http2StreamFrameToHttpObjectCodec is used to convert to HTTP/1.1 objects, and these HTTP/1.1 objects are forwarded to another remote peer (GitHub Advisory).

Impact

When exploited, an attacker can perform request smuggling attacks by embedding malicious requests inside the body as the request gets downgraded from HTTP/2 to HTTP/1.1. This could lead to unauthorized request processing and potential security bypass (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Netty version 4.1.60.Final. As a workaround, users can implement custom validation by creating a ChannelInboundHandler that is placed in the ChannelPipeline behind Http2StreamFrameToHttpObjectCodec (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34361CRITICAL9.3
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.validation
NoYesMar 31, 2026
CVE-2026-34214HIGH7.7
  • JavaJava
  • io.trino:trino-iceberg
NoYesMar 31, 2026
CVE-2026-34359HIGH7.4
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 31, 2026
CVE-2026-34237MEDIUM6.1
  • JavaJava
  • io.modelcontextprotocol.sdk:mcp-core
NoYesMar 31, 2026
CVE-2026-34360MEDIUM5.8
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 31, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management