Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1710

Опубликовано: 06 авг. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The issue appears to be that JBoss EAP 6.4.21 does not parse the field-name in accordance to RFC7230[1] as it returns a 200 instead of a 400.

A flaw was discovered in JBoss EAP, where it does not process the header field-name in accordance with RFC7230. Whitespace between the header field-name and colon is processed, resulting in an HTTP response code of 200 instead of a bad request of 400.

Меры по смягчению последствий

There is currently no known mitigation for this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7undertowNot affected
Red Hat JBoss Data Virtualization 6jbosswebOut of support scope
Red Hat JBoss Enterprise Application Platform 6jbosswebOut of support scope
Red Hat JBoss Web Server 3tomcatNot affected
Red Hat JBoss Web Server 5tomcatNot affected
Red Hat OpenShift Application RuntimesundertowAffected
Red Hat Process Automation 7undertowNot affected
Red Hat Single Sign-On 7undertowAffected
Red Hat Data Grid 7.3.7undertowFixedRHSA-2020:377917.09.2020
Red Hat JBoss Enterprise Application Platform 7undertow-coreFixedRHSA-2020:364207.09.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-74->CWE-113
https://bugzilla.redhat.com/show_bug.cgi?id=1793970EAP: field-name is not parsed in accordance to RFC7230

EPSS

Процентиль: 47%
0.00242
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 5 лет назад

The issue appears to be that JBoss EAP 6.4.21 does not parse the field-name in accordance to RFC7230[1] as it returns a 200 instead of a 400.

CVSS3: 5.3
github
больше 3 лет назад

The issue appears to be that JBoss EAP 6.4.21 does not parse the field-name in accordance to RFC7230[1] as it returns a 200 instead of a 400.

EPSS

Процентиль: 47%
0.00242
Низкий

7.5 High

CVSS3