Lucene search

K
nvd[email protected]NVD:CVE-2017-2666
HistoryJul 27, 2018 - 2:29 p.m.

CVE-2017-2666

2018-07-2714:29:00
CWE-444
web.nvd.nist.gov
2

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0.006

Percentile

78.4%

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Affected configurations

NVD
Node
redhatundertowMatch-
Node
redhatjboss_enterprise_application_platformMatch7.0.0
OR
redhatjboss_enterprise_application_platformMatch7.1.0
AND
redhatenterprise_linuxMatch6.0
Node
redhatjboss_enterprise_application_platformMatch7.0.0
OR
redhatjboss_enterprise_application_platformMatch7.1.0
AND
redhatenterprise_linuxMatch7.0
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0.006

Percentile

78.4%