Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mcfm-h73v-635m

Опубликовано: 19 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Undertow-core vulnerable to HTTP Request Smuggling

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Пакеты

Наименование

io.undertow:undertow-core

maven
Затронутые версииВерсия исправления

< 1.3.31

1.3.31

Наименование

io.undertow:undertow-core

maven
Затронутые версииВерсия исправления

>= 1.4.0, < 1.4.17

1.4.17

EPSS

Процентиль: 80%
0.01394
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
redhat
больше 8 лет назад

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
nvd
больше 7 лет назад

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.5
debian
больше 7 лет назад

It was discovered in Undertow that the code that parsed the HTTP reque ...

EPSS

Процентиль: 80%
0.01394
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-444