cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-1108,https://securityvulnerability.io/vulnerability/CVE-2023-1108,Infinite loop in sslconduit during close,"A vulnerability has been identified within Undertow, affecting its SSL Conduit. This flaw stems from an unexpected handshake status update, which can cause an infinite loop, thereby resulting in a Denial of Service. Malicious actors could exploit this vulnerability to prevent legitimate access to the service, leading to disruptions. Users of Undertow are advised to apply the latest patches to mitigate the risk associated with this issue.",Red Hat,"undertow,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8,Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9,Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7,Red Hat JBoss Fuse 7,Red Hat Single Sign-On 7,Red Hat Single Sign-On 7.6 for RHEL 7,Red Hat Single Sign-On 7.6 for RHEL 8,Red Hat Single Sign-On 7.6 for RHEL 9,RHEL-8 based Middleware Containers,Text-Only RHOAR,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Decision Manager 7,Red Hat Integration Camel K,Red Hat Integration Camel Quarkus,Red Hat Integration Service Registry,Red Hat JBoss Data Grid 7,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Fuse 6,Red Hat OpenStack Platform 13 (Queens),Red Hat Process Automation 7",7.5,HIGH,0.004100000020116568,false,false,false,false,,false,false,2023-09-14T15:15:00.000Z,0 CVE-2020-10719,https://securityvulnerability.io/vulnerability/CVE-2020-10719,,"A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.",Red Hat,Undertow,6.5,MEDIUM,0.0007099999929778278,false,false,false,false,,false,false,2020-05-26T14:57:51.000Z,0 CVE-2020-1757,https://securityvulnerability.io/vulnerability/CVE-2020-1757,,"A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass.",Red Hat,Undertow,8.1,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2020-04-21T15:31:14.000Z,0 CVE-2019-14888,https://securityvulnerability.io/vulnerability/CVE-2019-14888,,A vulnerability was found in the Undertow HTTP server in versions before 2.0.28.SP1 when listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.,Red Hat,Undertow,7.5,HIGH,0.0018400000408291817,false,false,false,false,,false,false,2020-01-23T16:25:11.000Z,0 CVE-2019-3888,https://securityvulnerability.io/vulnerability/CVE-2019-3888,,"A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)",Red Hat,Undertow,5.3,MEDIUM,0.019750000908970833,false,false,false,false,,false,false,2019-06-12T13:45:20.000Z,0 CVE-2018-14642,https://securityvulnerability.io/vulnerability/CVE-2018-14642,,"An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests.",Red Hat,Undertow,5.3,MEDIUM,0.003160000080242753,false,false,false,false,,false,false,2018-09-18T13:00:00.000Z,0 CVE-2018-1114,https://securityvulnerability.io/vulnerability/CVE-2018-1114,,It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak.,Red Hat,Undertow,6.5,MEDIUM,0.003759999992325902,false,false,false,false,,false,false,2018-09-11T15:00:00.000Z,0 CVE-2017-12165,https://securityvulnerability.io/vulnerability/CVE-2017-12165,,"It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling.",Red Hat,Undertow,2.6,LOW,0.004660000093281269,false,false,false,false,,false,false,2018-07-27T15:00:00.000Z,0 CVE-2018-1048,https://securityvulnerability.io/vulnerability/CVE-2018-1048,,"It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.",Red Hat,Undertow As Shipped In Jboss Eap 7.1.0.ga,7.5,HIGH,0.0027799999807029963,false,false,false,false,,false,false,2018-01-24T23:00:00.000Z,0 CVE-2017-7559,https://securityvulnerability.io/vulnerability/CVE-2017-7559,,"In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.",Red Hat,Undertow,6.1,MEDIUM,0.003969999961555004,false,false,false,false,,false,false,2018-01-10T15:29:00.000Z,0