CVE-2017-2666
- EPSS 2.22%
- Veröffentlicht 27.07.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:23:56
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject...
CVE-2018-1067
- EPSS 0.62%
- Veröffentlicht 21.05.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:06
In Undertow before versions 7.1.2.CR1, 7.1.2.GA it was found that the fix for CVE-2016-4993 was incomplete and Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization...
CVE-2017-12196
- EPSS 0.23%
- Veröffentlicht 18.04.2018 01:29:01
- Zuletzt bearbeitet 21.11.2024 03:09:01
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the a...
CVE-2017-7559
- EPSS 1.13%
- Veröffentlicht 10.01.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 03:32:09
In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be ...
- EPSS 54.4%
- Veröffentlicht 01.12.2014 15:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.