Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-3653

Опубликовано: 08 июл. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.

Отчет

Red Hat rates this as a Low impact vulnerability since the attacker needs to perform HTTP requests and the server must have incomplete configuration settings.

Меры по смягчению последствий

Setting the maxAge configuration is sufficient to prevent the behavior of this vulnerability being explored.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift ServerlessundertowFix deferred
Red Hat build of Apache Camel 4 for Quarkus 3undertowFix deferred
Red Hat build of Apache Camel for Spring Boot 4undertowAffected
Red Hat build of Apache Camel - HawtIO 4undertowAffected
Red Hat build of Apicurio Registry 2undertowNot affected
Red Hat Build of KeycloakundertowNot affected
Red Hat build of OptaPlanner 8undertowFix deferred
Red Hat build of Quarkusio.quarkus/quarkus-undertowAffected
Red Hat Data Grid 8undertowAffected
Red Hat Fuse 7undertowOut of support scope

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-401
https://bugzilla.redhat.com/show_bug.cgi?id=2274437undertow: LearningPushHandler can lead to remote memory DoS attacks

EPSS

Процентиль: 91%
0.06505
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.

CVSS3: 5.3
nvd
больше 1 года назад

A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.

CVSS3: 5.3
debian
больше 1 года назад

A vulnerability was found in Undertow. This issue requires enabling th ...

CVSS3: 5.3
github
больше 1 года назад

Undertow Missing Release of Memory after Effective Lifetime vulnerability

EPSS

Процентиль: 91%
0.06505
Низкий

5.3 Medium

CVSS3