Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-10687


A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.


Published

2020-09-23T13:15:15.157

Last Modified

2024-11-21T04:55:51.310

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-444
  • Type: Secondary
    CWE-444

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat undertow < 2.2.0 Yes
Application redhat jboss_enterprise_application_platform - Yes
Application redhat single_sign-on - Yes
Application redhat jboss_enterprise_application_platform 7.2 Yes
Operating System redhat enterprise_linux 6.0 No
Operating System redhat enterprise_linux 7.0 No
Operating System redhat enterprise_linux 8.0 No
Application redhat jboss_enterprise_application_platform 7.3 Yes
Application redhat jboss_enterprise_application_platform 7.4 Yes
Operating System redhat enterprise_linux 7.0 No
Operating System redhat enterprise_linux 8.0 No
Application redhat jboss_enterprise_application_platform 7.3 Yes
Operating System redhat enterprise_linux 6.0 No

References