CVE-2024-9622

5.3 MEDIUM

📋 TL;DR

This vulnerability in the resteasy-netty4 library allows HTTP request smuggling attacks using ASCII control characters. When exploited, it causes the Netty HttpObjectDecoder to enter a BAD_MESSAGE state, ignoring subsequent legitimate requests on the same connection and causing client timeouts. Systems using resteasy-netty4 with load balancers are primarily affected.

💻 Affected Systems

Products:
  • resteasy-netty4
Versions: All versions before the fix
Operating Systems: All operating systems running Java applications with resteasy-netty4
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using resteasy-netty4 with Netty's HTTP decoder. Risk increases when behind load balancers or proxies.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Denial of service affecting multiple clients through connection poisoning, potentially bypassing load balancer protections and disrupting service availability.

🟠

Likely Case

Client connection timeouts and degraded performance for users sharing affected connections, leading to intermittent service disruptions.

🟢

If Mitigated

Minimal impact with proper network segmentation, updated versions, and monitoring for abnormal HTTP traffic patterns.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP requests with ASCII control characters. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisories for specific patched versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-9622

Restart Required: Yes

Instructions:

1. Check current resteasy-netty4 version
2. Update to patched version per vendor advisory
3. Restart affected services
4. Verify fix implementation

🔧 Temporary Workarounds

HTTP Request Filtering

all

Implement input validation to reject HTTP requests containing ASCII control characters

Implement custom HTTP filter or use WAF rules to block requests with control characters

Connection Timeout Reduction

all

Reduce HTTP connection timeout values to minimize impact of poisoned connections

Configure Netty connection timeout settings in application configuration

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block HTTP smuggling attempts
  • Monitor for abnormal connection patterns and implement rate limiting on suspicious requests

🔍 How to Verify

Check if Vulnerable:

Check application dependencies for resteasy-netty4 library version and compare against patched versions in vendor advisories

Check Version:

Check Maven/Gradle dependencies or examine JAR manifests for resteasy-netty4 version

Verify Fix Applied:

Test with crafted HTTP requests containing ASCII control characters to ensure they are properly rejected or handled

📡 Detection & Monitoring

Log Indicators:

  • HTTP 400 Bad Request errors with BAD_MESSAGE state
  • Unusual connection timeouts
  • Requests with ASCII control characters in logs

Network Indicators:

  • HTTP requests with control characters in headers or body
  • Abnormal connection termination patterns

SIEM Query:

http.status_code:400 AND http.message:"BAD_MESSAGE" OR http.request contains control characters

🔗 References

📤 Share & Export