Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3888

Опубликовано: 12 июн. 2019
Источник: debian

Описание

A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)

Пакеты

ПакетСтатусВерсия исправленияРелизТип
undertowfixed2.0.23-1package

Примечания

  • https://github.com/undertow-io/undertow/pull/736

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)

CVSS3: 5.3
redhat
больше 6 лет назад

A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)

CVSS3: 9.8
nvd
больше 6 лет назад

A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)

CVSS3: 9.8
github
больше 6 лет назад

Credential exposure through log files in Undertow

CVSS3: 5.3
fstec
больше 6 лет назад

Уязвимость веб-сервера Undertow, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю раскрыть защищаемую информацию