First published: Mon Apr 11 2022(Updated: )
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-undertow | <0:2.2.17-2.SP4_redhat_00001.1.el8ea | 0:2.2.17-2.SP4_redhat_00001.1.el8ea |
redhat/eap7-undertow | <0:2.2.17-2.SP4_redhat_00001.1.el7ea | 0:2.2.17-2.SP4_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00001.1.el7 | 0:18.0.3-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00001.1.el8 | 0:18.0.3-1.redhat_00001.1.el8 |
redhat/rh-sso7 | <0:1-5.el9 | 0:1-5.el9 |
redhat/rh-sso7-javapackages-tools | <0:6.0.0-7.el9 | 0:6.0.0-7.el9 |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00001.1.el9 | 0:18.0.3-1.redhat_00001.1.el9 |
Redhat Openshift Application Runtimes | ||
Redhat Single Sign-on | =7.0 | |
Redhat Undertow | <2.2.17 | |
Redhat Undertow | =2.2.17 | |
Redhat Undertow | =2.2.17-sp1 | |
Redhat Undertow | =2.2.17-sp2 | |
Redhat Undertow | =2.2.19 | |
Redhat Undertow | =2.2.19-sp1 | |
Redhat Undertow | =2.3.0-alpha1 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Cloud Secure Agent | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this flaw is CVE-2022-1319.
The severity level of CVE-2022-1319 is high with a score of 7.5.
EAP 7 improperly sends two response packets for an AJP 400 response, which causes a failure when the connection is reused.
The affected software packages include eap7-undertow, rh-sso7-keycloak, Redhat Openshift Application Runtimes, Redhat Single Sign-on, and Netapp Active Iq Unified Manager.
Apply the appropriate security updates provided by the vendor to fix CVE-2022-1319.