Show filters
34 Total Results
Displaying 1-10 of 34
Sort by:
Attacker Value
Unknown

CVE-2024-1459

Disclosure Date: February 12, 2024 (last updated October 22, 2024)
A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.
Attacker Value
Unknown

CVE-2023-5379

Disclosure Date: December 12, 2023 (last updated October 24, 2024)
A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).
Attacker Value
Unknown

CVE-2023-3223

Disclosure Date: September 27, 2023 (last updated May 03, 2024)
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.
Attacker Value
Unknown

CVE-2023-1108

Disclosure Date: September 14, 2023 (last updated May 03, 2024)
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
Attacker Value
Unknown

CVE-2022-4492

Disclosure Date: February 23, 2023 (last updated October 08, 2023)
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Attacker Value
Unknown

CVE-2022-2764

Disclosure Date: September 01, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
Attacker Value
Unknown

CVE-2022-1319

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
Attacker Value
Unknown

CVE-2022-1259

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629.
Attacker Value
Unknown

CVE-2021-3859

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.
Attacker Value
Unknown

CVE-2021-3690

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.