It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
2018-07-27T14:29:00.207
2024-11-21T03:23:56.180
Modified
CVSSv3.0: 6.5 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:P/A:N
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | undertow | - | Yes |
Application | redhat | jboss_enterprise_application_platform | 7.0.0 | Yes |
Application | redhat | jboss_enterprise_application_platform | 7.1.0 | Yes |
Operating System | redhat | enterprise_linux | 6.0 | No |
Application | redhat | jboss_enterprise_application_platform | 7.0.0 | Yes |
Application | redhat | jboss_enterprise_application_platform | 7.1.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |