Vulnerability Name: | CVE-2017-12165 (CCN-148265) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2017-08-01 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-07-27 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
Summary: | It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-444 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-12165 Source: CCN Type: Undertow Web site Undertow Source: REDHAT Type: Vendor Advisory RHSA-2017:3454 Source: REDHAT Type: Vendor Advisory RHSA-2017:3455 Source: REDHAT Type: Vendor Advisory RHSA-2017:3456 Source: REDHAT Type: Vendor Advisory RHSA-2017:3458 Source: REDHAT Type: Vendor Advisory RHSA-2018:0002 Source: REDHAT Type: Vendor Advisory RHSA-2018:0003 Source: REDHAT Type: Vendor Advisory RHSA-2018:0004 Source: REDHAT Type: Vendor Advisory RHSA-2018:0005 Source: REDHAT Type: Vendor Advisory RHSA-2018:1322 Source: CCN Type: Red Hat Bugzilla Bug 1490301 (CVE-2017-12165) CVE-2017-12165 undertow: improper whitespace parsing leading to potential HTTP request smuggling Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165 Source: XF Type: UNKNOWN undertow-cve201712165-request-smuggling(148265) Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-12165 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |