Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31684: HTTP Server may log request headers in Reactor Netty

0
Medium
VulnerabilityCVE-2022-31684cvecve-2022-31684
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Reactor Netty

Description

Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.

AI-Powered Analysis

AILast updated: 07/05/2025, 02:39:33 UTC

Technical Analysis

CVE-2022-31684 is a medium-severity vulnerability affecting Reactor Netty HTTP Server versions 1.0.11 through 1.0.23. Reactor Netty is a foundational networking library used in reactive Java applications to build non-blocking HTTP servers and clients. The vulnerability arises when the HTTP server processes invalid HTTP requests and logs request headers at the WARN level. In these cases, the server may inadvertently log sensitive information contained in the request headers, such as valid access tokens. This leakage occurs because the logging mechanism does not adequately sanitize or filter sensitive header data before writing it to server logs. The vulnerability is limited to scenarios where invalid HTTP requests are received and logging at WARN level is enabled, which means normal valid requests are not affected. The CVSS v3.1 base score is 4.3, reflecting a low to medium impact primarily on confidentiality, with no impact on integrity or availability. Exploitation requires an attacker to send crafted invalid HTTP requests to the server and have access to the server logs to retrieve the leaked tokens. There are no known exploits in the wild reported to date. The vulnerability is classified under CWE-532 (Information Exposure Through Log Files). No official patches are linked in the provided data, so mitigation may require upgrading Reactor Netty to a fixed version beyond 1.0.23 or applying custom logging configurations to avoid sensitive data exposure.

Potential Impact

For European organizations using Reactor Netty in their web applications or microservices infrastructure, this vulnerability poses a confidentiality risk. If attackers can send invalid HTTP requests and gain access to server logs, they may extract valid access tokens or other sensitive header information, potentially enabling unauthorized access to protected resources or services. This risk is heightened in environments where logs are accessible by multiple personnel or insufficiently protected, such as shared hosting or cloud environments without strict access controls. The impact is limited to confidentiality; integrity and availability are not affected. However, leaked tokens can lead to further compromise of systems or data breaches. Given the widespread use of Java and reactive frameworks in European enterprises, especially in financial, healthcare, and government sectors, the vulnerability could be leveraged to escalate attacks if combined with other weaknesses. The requirement for invalid requests and WARN-level logging reduces the likelihood of exploitation but does not eliminate the risk, especially in complex or misconfigured environments.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Identify all applications and services using Reactor Netty versions 1.0.11 to 1.0.23. 2) Upgrade Reactor Netty to a version later than 1.0.23 where the vulnerability is fixed, or apply vendor-provided patches if available. 3) Review and adjust logging configurations to avoid logging sensitive headers at WARN or higher levels, especially for invalid HTTP requests. Implement custom log filters or sanitization to redact sensitive tokens from logs. 4) Restrict access to server logs strictly to authorized personnel and systems, using role-based access controls and encryption at rest. 5) Monitor logs for unusual invalid HTTP request patterns that might indicate exploitation attempts. 6) Conduct security reviews of token handling and ensure tokens have limited scope and lifetime to minimize impact if leaked. 7) Incorporate this vulnerability into incident response and threat hunting processes to detect potential misuse. These measures go beyond generic advice by focusing on logging practices, token management, and access controls tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2022-05-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd79e6

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 2:39:33 AM

Last updated: 2/7/2026, 4:17:43 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats