An information leak vulnerability was found in Undertow. If all headers are not written out in the first write() call then the code that handles flushing the buffer will always write out the full contents of the writevBuffer buffer, which may contain data from previous requests.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:0362 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0364 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0365 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0380 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:1106 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:1107 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:1108 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:1140 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14642 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2018-09-18 13:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-14642
Mitre link : CVE-2018-14642
CVE.ORG link : CVE-2018-14642
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
- undertow
- enterprise_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor