Описание
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Issue TrackingMitigationVendor Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Issue TrackingMitigationVendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
EPSS
4.8 Medium
CVSS3
9.8 Critical
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for i ...
Potential to access user credentials from the log files when debug logging enabled
Уязвимость компонента io.undertow.request.security веб-сервера Undertow, позволяющая нарушителю получить учетные данные пользователя из файлов журнала
EPSS
4.8 Medium
CVSS3
9.8 Critical
CVSS3
4.3 Medium
CVSS2