A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
2019-06-12T14:29:04.790
2024-11-21T04:42:48.223
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redhat | undertow | < 2.0.21 | Yes |
Application | redhat | virtualization | 4.0 | Yes |
Application | redhat | virtualization_host | 4.0 | Yes |
Operating System | redhat | enterprise_linux | 7.0 | No |
Application | redhat | jboss_data_grid | - | Yes |
Application | redhat | openshift_application_runtimes | - | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |