| Vulnerability Name: | CVE-2017-7559 (CCN-137415) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2017-08-15 | ||||||||||||||||||||||||||||||||||||
| Published: | 2017-08-15 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
| Summary: | In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-444 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-7559 Source: REDHAT Type: Vendor Advisory RHSA-2017:3454 Source: REDHAT Type: Vendor Advisory RHSA-2017:3455 Source: REDHAT Type: Vendor Advisory RHSA-2017:3456 Source: REDHAT Type: Vendor Advisory RHSA-2017:3458 Source: REDHAT Type: Vendor Advisory RHSA-2018:0002 Source: CCN Type: RHSA-2018:0003 Red Hat JBoss Enterprise Application Platform 7.0.9 security update Source: REDHAT Type: Vendor Advisory RHSA-2018:0003 Source: REDHAT Type: Vendor Advisory RHSA-2018:0004 Source: REDHAT Type: Vendor Advisory RHSA-2018:0005 Source: REDHAT Type: Vendor Advisory RHSA-2018:1322 Source: CCN Type: Red Hat Bugzilla Bug 1481665 (CVE-2017-7559) CVE-2017-7559 undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7559 Source: XF Type: UNKNOWN redhat-cve20177559-xss(137415) Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://issues.jboss.org/browse/UNDERTOW-1251 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||