
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in Versity Gateway (versitygw) prior to version 1.0.17 has been identified where sending AWS chunked data without a Content-Length HTTP header causes a panic condition in the server. The vulnerability was discovered in July 2025 and affects all versions of the software before the patch (GitHub Advisory).
The vulnerability occurs in the HashReader function (csum-reader.go) due to a null pointer dereference when handling AWS chunked data transfers. The issue stems from the fasthttp library's behavior where it sets a -2 content length value internally when no Content-Length header is present, leading to a failure in setting up an io.Reader in the request context structure. This becomes problematic when AWS uses chunked encoding mode, particularly when the upload size is not known in advance (GitHub Advisory).
When exploited, this vulnerability causes the Versity Gateway server to panic and exit, effectively creating a denial of service condition. The issue is particularly concerning as it lacks structured exception handling and defensive coding practices, making it a potential target for DOS attacks (GitHub Advisory).
The issue has been patched in version 1.0.17 of Versity Gateway. The fix involves overriding the nil body reader with an empty reader to prevent panics in case of unexpected or malformed HTTP requests (Versity Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."