operatorfabric-core icon indicating copy to clipboard operation
operatorfabric-core copied to clipboard

CVE-2024-6162 (High) detected in undertow-core-2.3.13.Final.jar

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 0 comments

CVE-2024-6162 - High Severity Vulnerability

Vulnerable Library - undertow-core-2.3.13.Final.jar

Library home page: http://www.jboss.org

Path to dependency file: /services/businessconfig/build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.undertow/undertow-core/2.3.13.Final/249236b81e21dc26066232086bb54c73b34a3ecc/undertow-core-2.3.13.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.undertow/undertow-core/2.3.13.Final/249236b81e21dc26066232086bb54c73b34a3ecc/undertow-core-2.3.13.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.undertow/undertow-core/2.3.13.Final/249236b81e21dc26066232086bb54c73b34a3ecc/undertow-core-2.3.13.Final.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.undertow/undertow-core/2.3.13.Final/249236b81e21dc26066232086bb54c73b34a3ecc/undertow-core-2.3.13.Final.jar

Dependency Hierarchy:

  • spring-boot-starter-undertow-3.3.2.jar (Root Library)
    • :x: undertow-core-2.3.13.Final.jar (Vulnerable Library)

Found in base branch: develop

Vulnerability Details

A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up.

Publish Date: 2024-06-20

URL: CVE-2024-6162

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=2293069

Release Date: 2024-06-20

Fix Resolution: io.undertow:undertow-core:2.3.14.Final


Step up your Open Source Security Game with Mend here