Vulnerability Name:

CVE-2022-1319 (CCN-235003)

Assigned:2022-07-07
Published:2022-07-07
Updated:2022-11-07
Summary:A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-252
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-1319

Source: MISC
Type: Vendor Advisory
https://access.redhat.com/security/cve/CVE-2022-1319

Source: CCN
Type: Red Hat Bugzilla - Bug 2073890
(CVE-2022-1319) - CVE-2022-1319 undertow: Double AJP response for 400 from EAP 7 results in CPING failures

Source: MISC
Type: Issue Tracking, Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2073890

Source: XF
Type: UNKNOWN
undertow-cve20221319-dos(235003)

Source: CCN
Type: Undertow GIT Repository
[UNDERTOW-2060] fix double AJP response

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/undertow-io/undertow/commit/1443a1a2bbb8e32e56788109d8285db250d55c8b

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/undertow-io/undertow/commit/7c5b3ab885b5638fd3f1e8a935d5063d68aa2df3

Source: MISC
Type: Issue Tracking, Vendor Advisory
https://issues.redhat.com/browse/UNDERTOW-2060

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20221014-0006/

Source: CCN
Type: Mend Vulnerability Database
CVE-2022-1319

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:2.3.0:alpha1:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:2.2.19:sp1:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:2.2.19:-:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:2.2.17:-:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:2.2.17:sp1:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:2.2.17:sp2:*:*:*:*:*:*
  • OR cpe:/a:redhat:undertow:*:*:*:*:*:*:*:* (Version < 2.2.17)

  • Configuration 2:
  • cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
  • OR cpe:/a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    redhat single sign-on 7.0
    redhat openshift application runtimes -
    redhat undertow 2.3.0 alpha1
    redhat undertow 2.2.19 sp1
    redhat undertow 2.2.19 -
    redhat undertow 2.2.17 -
    redhat undertow 2.2.17 sp1
    redhat undertow 2.2.17 sp2
    redhat undertow *
    netapp oncommand workflow automation -
    netapp oncommand insight -
    netapp active iq unified manager -
    netapp active iq unified manager -
    netapp active iq unified manager -
    netapp cloud secure agent -