A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2022-1319 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2073890 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/undertow-io/undertow/commit/1443a1a2bbb8e32e56788109d8285db250d55c8b - Patch, Third Party Advisory | |
References | () https://github.com/undertow-io/undertow/commit/7c5b3ab885b5638fd3f1e8a935d5063d68aa2df3 - Patch, Third Party Advisory | |
References | () https://issues.redhat.com/browse/UNDERTOW-2060 - Issue Tracking, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20221014-0006/ - Third Party Advisory |
07 Nov 2022, 19:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* |
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20221014-0006/ - Third Party Advisory |
14 Oct 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Sep 2022, 14:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:undertow:2.3.0:alpha1:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:2.2.19:-:*:*:*:*:*:* cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:2.2.19:sp1:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:2.2.17:sp2:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:2.2.17:sp1:*:*:*:*:*:* cpe:2.3:a:redhat:undertow:2.2.17:-:*:*:*:*:*:* |
|
CWE | CWE-252 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://github.com/undertow-io/undertow/commit/1443a1a2bbb8e32e56788109d8285db250d55c8b - Patch, Third Party Advisory | |
References | (MISC) https://github.com/undertow-io/undertow/commit/7c5b3ab885b5638fd3f1e8a935d5063d68aa2df3 - Patch, Third Party Advisory | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2022-1319 - Vendor Advisory | |
References | (MISC) https://issues.redhat.com/browse/UNDERTOW-2060 - Issue Tracking, Vendor Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2073890 - Issue Tracking, Vendor Advisory |
31 Aug 2022, 16:53
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-31 16:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1319
Mitre link : CVE-2022-1319
CVE.ORG link : CVE-2022-1319
JSON object : View
Products Affected
netapp
- cloud_secure_agent
- oncommand_workflow_automation
- oncommand_insight
- active_iq_unified_manager
redhat
- single_sign-on
- openshift_application_runtimes
- undertow
CWE
CWE-252
Unchecked Return Value