Unknown
CVE-2024-3653
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server’s config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- Red Hat build of Quarkus 3.8.6.redhat
- Red Hat JBoss Enterprise Application Platform 7
- Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
- Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
- Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
- Red Hat JBoss Enterprise Application Platform 8
- OpenShift Serverless
- Red Hat build of Apache Camel for Quarkus
- Red Hat build of Apache Camel for Spring Boot 4
- Red Hat build of Apache Camel HawtIO
- Red Hat build of Apicurio Registry
- Red Hat Build of Keycloak
- Red Hat build of OptaPlanner 8
- Red Hat build of Quarkus
- Red Hat Data Grid 8
- Red Hat Fuse 7
- Red Hat Integration Camel K
- Red Hat Integration Camel Quarkus
- Red Hat JBoss Data Grid 7
- Red Hat JBoss Enterprise Application Platform Expansion Pack
- Red Hat JBoss Fuse Service Works 6
- Red Hat Process Automation 7
- Red Hat Single Sign On 7
- streams for Apache Kafka
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: