CVE-2017-2666

CVSS v3.0 6.5 (Medium)
65% Progress
CVSS v2.0 6.4 (Medium)
64% Progress
EPSS 0.59 % (79th)
0.59% Progress
Affected Products 4
Advisories 2

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Weaknesses
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Related CVEs
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2018-07-27 14:29:00
(6 years ago)
Updated Date
2019-10-09 23:27:03
(5 years ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

AND
    CPE23 From Up To
OR  
  Redhat Undertow cpe:2.3:a:redhat:undertow:-

Configuration #2

AND
    CPE23 From Up To
OR  
  Redhat Jboss Enterprise Application Platform 7.0.0 cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0
OR  
  Running on/with
  Redhat Jboss Enterprise Application Platform 7.1.0 cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0
OR  
  Running on/with
  Redhat Enterprise Linux 6.0 cpe:2.3:o:redhat:enterprise_linux:6.0

Configuration #3

AND
    CPE23 From Up To
OR  
  Redhat Jboss Enterprise Application Platform 7.0.0 cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0
OR  
  Running on/with
  Redhat Jboss Enterprise Application Platform 7.1.0 cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0
OR  
  Running on/with
  Redhat Enterprise Linux 7.0 cpe:2.3:o:redhat:enterprise_linux:7.0

Configuration #4

AND
    CPE23 From Up To
OR  
  Debian Linux 9.0 cpe:2.3:o:debian:debian_linux:9.0
OR  
  Running on/with
  Debian Linux 10.0 cpe:2.3:o:debian:debian_linux:10.0
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...