A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1785049 | Issue Tracking Vendor Advisory |
https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220210-0015/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2020-09-23 06:15
Updated : 2022-02-22 02:05
NVD link : CVE-2020-10687
Mitre link : CVE-2020-10687
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
redhat
- undertow
- single_sign-on
- enterprise_linux
- jboss_enterprise_application_platform