cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-1108,https://securityvulnerability.io/vulnerability/CVE-2023-1108,Infinite loop in sslconduit during close,"A vulnerability has been identified within Undertow, affecting its SSL Conduit. This flaw stems from an unexpected handshake status update, which can cause an infinite loop, thereby resulting in a Denial of Service. Malicious actors could exploit this vulnerability to prevent legitimate access to the service, leading to disruptions. Users of Undertow are advised to apply the latest patches to mitigate the risk associated with this issue.",Red Hat,"undertow,Red Hat JBoss Enterprise Application Platform 7,Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8,Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9,Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7,Red Hat JBoss Fuse 7,Red Hat Single Sign-On 7,Red Hat Single Sign-On 7.6 for RHEL 7,Red Hat Single Sign-On 7.6 for RHEL 8,Red Hat Single Sign-On 7.6 for RHEL 9,RHEL-8 based Middleware Containers,Text-Only RHOAR,Red Hat build of Quarkus,Red Hat Data Grid 8,Red Hat Decision Manager 7,Red Hat Integration Camel K,Red Hat Integration Camel Quarkus,Red Hat Integration Service Registry,Red Hat JBoss Data Grid 7,Red Hat JBoss Enterprise Application Platform Expansion Pack,Red Hat JBoss Fuse 6,Red Hat OpenStack Platform 13 (Queens),Red Hat Process Automation 7",7.5,HIGH,0.004100000020116568,false,,false,false,false,,,false,false,,2023-09-14T15:15:00.000Z,0 CVE-2020-10719,https://securityvulnerability.io/vulnerability/CVE-2020-10719,HTTP Request Smuggling Vulnerability in Undertow by Red Hat,"A flaw exists in Undertow affecting versions before 2.1.1.Final, where improper processing of malformed HTTP requests with oversized chunk sizes can be exploited. This security weakness may enable an attacker to perform HTTP request smuggling, compromising the integrity of web communications and potentially bypassing security measures.",Red Hat,Undertow,6.5,MEDIUM,0.0007099999929778278,false,,false,false,false,,,false,false,,2020-05-26T14:57:51.000Z,0 CVE-2020-1757,https://securityvulnerability.io/vulnerability/CVE-2020-1757,Servlet Path Normalization Flaw in Undertow Server Products,"A flaw exists in the Undertow server that affects multiple versions, where the servlet container incorrectly normalizes the servlet path. This occurs due to the truncation of the path after a semicolon, potentially allowing a security bypass within application mappings. This vulnerability can lead malicious actors to exploit application behavior and compromise security configurations.",Red Hat,Undertow,8.1,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2020-04-21T15:31:14.000Z,0 CVE-2019-14888,https://securityvulnerability.io/vulnerability/CVE-2019-14888,Denial of Service Vulnerability in Undertow HTTP Server by Red Hat,"A vulnerability exists in the Undertow HTTP server, specifically in versions prior to 2.0.28.SP1, when configured to listen on HTTPS. An attacker may exploit this weakness by targeting the HTTPS port, potentially resulting in a Denial of Service condition that renders the web service unavailable on SSL. It is critical for users of affected versions to apply the necessary updates to mitigate this issue.",Red Hat,Undertow,7.5,HIGH,0.0025100000202655792,false,,false,false,false,,,false,false,,2020-01-23T16:25:11.000Z,0 CVE-2019-3888,https://securityvulnerability.io/vulnerability/CVE-2019-3888,Information Exposure in Undertow Web Server Prior to 2.0.21,"A vulnerability in the Undertow web server allows for the exposure of plaintext credentials through log files. This occurs when the HttpServerExchange object is logged at ERROR level, resulting in sensitive information being recorded in logs rather than being properly handled. This event is triggered by the Connectors.executeRootHandler method, posing potential risks to security as attackers could access this information if they gain access to log files.",Red Hat,Undertow,5.3,MEDIUM,0.019750000908970833,false,,false,false,false,,,false,false,,2019-06-12T13:45:20.000Z,0 CVE-2018-14642,https://securityvulnerability.io/vulnerability/CVE-2018-14642,,"An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests.",Red Hat,Undertow,5.3,MEDIUM,0.003160000080242753,false,,false,false,false,,,false,false,,2018-09-18T13:00:00.000Z,0 CVE-2018-1114,https://securityvulnerability.io/vulnerability/CVE-2018-1114,,It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak.,Red Hat,Undertow,6.5,MEDIUM,0.003759999992325902,false,,false,false,false,,,false,false,,2018-09-11T15:00:00.000Z,0 CVE-2017-12165,https://securityvulnerability.io/vulnerability/CVE-2017-12165,,"It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling.",Red Hat,Undertow,2.6,LOW,0.004660000093281269,false,,false,false,false,,,false,false,,2018-07-27T15:00:00.000Z,0 CVE-2018-1048,https://securityvulnerability.io/vulnerability/CVE-2018-1048,,"It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.",Red Hat,Undertow As Shipped In Jboss Eap 7.1.0.ga,7.5,HIGH,0.0027799999807029963,false,,false,false,false,,,false,false,,2018-01-24T23:00:00.000Z,0 CVE-2017-7559,https://securityvulnerability.io/vulnerability/CVE-2017-7559,,"In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.",Red Hat,Undertow,6.1,MEDIUM,0.003969999961555004,false,,false,false,false,,,false,false,,2018-01-10T15:29:00.000Z,0