Description
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity.
Published: 2021-02-23
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-1382 A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity.
Github GHSA Github GHSA GHSA-qjwc-v72v-fq6r HTTP request smuggling in Undertow
History

No history.

Subscriptions

Netapp Active Iq Unified Manager Oncommand Workflow Automation
Redhat Jboss Enterprise Application Platform Jbosseapxp Red Hat Single Sign On Undertow
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-03T17:30:07.487Z

Reserved: 2020-12-17T00:00:00.000Z

Link: CVE-2021-20220

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-23T18:15:13.397

Modified: 2024-11-21T05:46:09.377

Link: CVE-2021-20220

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-02-04T00:00:00Z

Links: CVE-2021-20220 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses