Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-12543

Опубликовано: 07 янв. 2026
Источник: debian

Описание

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
undertowunfixedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2408784

Связанные уязвимости

CVSS3: 9.6
ubuntu
около 1 месяца назад

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

CVSS3: 9.6
nvd
около 1 месяца назад

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

CVSS3: 9.6
github
около 1 месяца назад

Undertow HTTP server core doesn't properly validate the Host header in incoming HTTP requests

CVSS3: 9.6
fstec
30 дней назад

Уязвимость ядра HTTP-сервера Undertow, связанная с ошибками механизма проверки входных данных при обработке заголовков Host, позволяющая нарушителю осуществить SSRF-атаку