Lucene search

K
cve[email protected]CVE-2017-7559
HistoryJan 10, 2018 - 3:29 p.m.

CVE-2017-7559

2018-01-1015:29:00
CWE-444
web.nvd.nist.gov
112
undertow
http
security
injection
cve-2017-7559

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.006

Percentile

78.4%

In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Affected configurations

Vulners
NVD
Node
red_hat\,_inc.undertowRange2.02.0.0
OR
red_hat\,_inc.undertowRange1.4.01.4.17
OR
red_hat\,_inc.undertowRange1.3.01.3.31
VendorProductVersionCPE
redhatundertow2.0.0cpe:/a:redhat:undertow:2.0.0:alpha1::

CNA Affected

[
  {
    "product": "undertow",
    "vendor": "Red Hat, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "2.x before 2.0.0.Alpha2"
      },
      {
        "status": "affected",
        "version": "1.4.x before 1.4.17.Final"
      },
      {
        "status": "affected",
        "version": "1.3.x before 1.3.31.Final"
      }
    ]
  }
]

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.006

Percentile

78.4%