Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7885

Опубликовано: 07 авг. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

Отчет

Red Hat decided to rate this vulnerability as Important because of the potential loss of Availability and no additional privileges being required.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3undertowAffected
Red Hat build of Apache Camel - HawtIO 4undertowAffected
Red Hat Build of KeycloakundertowAffected
Red Hat build of Quarkusio.quarkus/quarkus-undertowNot affected
Red Hat Data Grid 8undertowWill not fix
Red Hat Fuse 7undertowWill not fix
Red Hat Integration Camel K 1undertowWill not fix
Red Hat JBoss Data Grid 7undertowOut of support scope
Red Hat JBoss Enterprise Application Platform Expansion Packundertow-coreNot affected
Red Hat Process Automation 7undertowOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=2305290undertow: Improper State Management in Proxy Protocol parsing causes information leakage

EPSS

Процентиль: 91%
0.06348
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

CVSS3: 7.5
nvd
больше 1 года назад

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

CVSS3: 7.5
debian
больше 1 года назад

A vulnerability was found in Undertow where the ProxyProtocolReadListe ...

CVSS3: 7.5
github
больше 1 года назад

Undertow vulnerable to Race Condition

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость функции parseProxyProtocolV1() класса ProxyProtocolReadListener веб-сервера Undertow, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 91%
0.06348
Низкий

7.5 High

CVSS3