CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
90.4%
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it’s possible to bypass the limit by setting the file name in the request to null.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | undertow | * | cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 4.11 | cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:* |
redhat | openshift_container_platform | 4.12 | cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* |
redhat | openshift_container_platform_for_ibm_linuxone | 4.9 | cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.9:*:*:*:*:*:*:* |
redhat | openshift_container_platform_for_ibm_linuxone | 4.10 | cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.10:*:*:*:*:*:*:* |
redhat | openshift_container_platform_for_power | 4.9 | cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:* |
redhat | openshift_container_platform_for_power | 4.10 | cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:* |
redhat | enterprise_linux | 8.0 | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
redhat | jboss_enterprise_application_platform_text-only_advisories | - | cpe:2.3:a:redhat:jboss_enterprise_application_platform_text-only_advisories:-:*:*:*:*:*:*:* |
redhat | single_sign-on | - | cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:* |
access.redhat.com/errata/RHSA-2023:4505
access.redhat.com/errata/RHSA-2023:4506
access.redhat.com/errata/RHSA-2023:4507
access.redhat.com/errata/RHSA-2023:4509
access.redhat.com/errata/RHSA-2023:4918
access.redhat.com/errata/RHSA-2023:4919
access.redhat.com/errata/RHSA-2023:4920
access.redhat.com/errata/RHSA-2023:4921
access.redhat.com/errata/RHSA-2023:4924
access.redhat.com/errata/RHSA-2023:7247
access.redhat.com/security/cve/CVE-2023-3223
bugzilla.redhat.com/show_bug.cgi?id=2209689
security.netapp.com/advisory/ntap-20231027-0004/
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
90.4%