CVE-2021-25762
https://notcve.org/view.php?id=CVE-2021-25762
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible. En JetBrains Ktor versiones anteriores a 1.4.3, fue posible un Trafico No Autorizado de Peticiones HTTP • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •
CVE-2021-25763
https://notcve.org/view.php?id=CVE-2021-25763
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default. En JetBrains Ktor versiones anteriores a 1.4.2, un conjunto de cifrado débil estaban habilitados por defecto • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •
CVE-2021-25761
https://notcve.org/view.php?id=CVE-2021-25761
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible. En JetBrains Ktor versiones anteriores a 1.5.0, fue posible un ataque de tipo birthday en la clave de SessionStorage • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020 • CWE-326: Inadequate Encryption Strength •
CVE-2020-26129
https://notcve.org/view.php?id=CVE-2020-26129
In JetBrains Ktor before 1.4.1, HTTP request smuggling was possible. En JetBrains Ktor versiones anteriores a 1.4.1, era posible el tráfico no autorizado de peticiones HTTP • https://blog.jetbrains.com https://blog.jetbrains.com/2020/11/16/jetbrains-security-bulletin-q3-2020 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •
CVE-2020-5207 – Request smuggling is possible in Ktor when both chunked TE and content length specified
https://notcve.org/view.php?id=CVE-2020-5207
In Ktor before 1.3.0, request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle \n as a headers separator. En Ktor versiones anteriores a 1.3.0, el tráfico no autorizado de peticiones es posible cuando se ejecuta detrás de un proxy que no maneja Content-Length y Transfer-Encoding apropiadamente o no maneja \n como un separador de encabezados. • https://github.com/ktorio/ktor/pull/1547 https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •