CVE-2017-7559 – io.undertow:undertow-core
Package
Manager: maven
Name: io.undertow:undertow-core
Vulnerable Version: >=1.4.0 <1.4.17.final || >=1.3.0 <1.3.31.final || =2.0.0.alpha1 || >=2.0.0.alpha1 <2.0.0.alpha2
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.01128 pctl0.77482
Details
Undertow vulnerable to Request Smuggling In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
Metadata
Created: 2022-05-13T01:36:16Z
Modified: 2022-11-08T12:48:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rj76-h87p-r3wf/GHSA-rj76-h87p-r3wf.json
CWE IDs: ["CWE-444"]
Alternative ID: GHSA-rj76-h87p-r3wf
Finding: F110
Auto approve: 1