Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7559

Опубликовано: 13 дек. 2017
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

It was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Fuse 6wildfly-undertowOut of support scope
Red Hat Single Sign-On 7wildfly-undertowNot affected
Red Hat JBoss A-MQ 6.3FixedRHSA-2018:132203.05.2018
Red Hat JBoss EAP 7FixedRHSA-2017:345613.12.2017
Red Hat JBoss EAP 7wildfly-undertowFixedRHSA-2018:000303.01.2018
Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6eap7-activemq-artemisFixedRHSA-2018:000203.01.2018
Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6eap7-hibernateFixedRHSA-2018:000203.01.2018
Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6eap7-ironjacamarFixedRHSA-2018:000203.01.2018
Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6eap7-jboss-remotingFixedRHSA-2018:000203.01.2018
Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6eap7-jboss-xnio-baseFixedRHSA-2018:000203.01.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1481665undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666)

EPSS

Процентиль: 78%
0.01128
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 8 лет назад

In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.1
nvd
около 8 лет назад

In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

CVSS3: 6.1
debian
около 8 лет назад

In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1. ...

CVSS3: 6.1
github
больше 3 лет назад

Undertow vulnerable to Request Smuggling

EPSS

Процентиль: 78%
0.01128
Низкий

6.5 Medium

CVSS3