


Perceptive Security
SOC/SIEM Consultancy

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strin…
Published:
26 maart 2026 om 23:00:00
Alert date:
27 maart 2026 om 21:04:38
Source:
nvd.nist.gov
Web Technologies, Network Infrastructure
Netty, an asynchronous event-driven network application framework, contains a vulnerability in versions prior to 4.1.132.Final and 4.2.10.Final. The framework incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, which enables request smuggling attacks. This parsing flaw can allow attackers to manipulate HTTP request processing and potentially bypass security controls. The vulnerability has been addressed in the latest versions 4.1.132.Final and 4.2.10.Final with proper parsing fixes.
Technical details
Mitigation steps:
Affected products:
Netty
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33870
https://github.com/netty/netty/security/advisories/GHSA-pwqr-wmgm-9rr8
https://w4ke.info/2025/06/18/funky-chunks.html
https://w4ke.info/2025/10/29/funky-chunks-2.html
https://www.rfc-editor.org/rfc/rfc9110
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
