First published: Wed Oct 19 2022(Updated: )
A flaw was found in the Reactor Netty HTTP Server, which may log request headers in some cases of invalid HTTP requests. This could allow an attacker to access privileged information when WARN level logging is enabled.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Reactor Netty | >=1.0.11<=1.0.23 | |
IBM Disconnected Log Collector | <=v1.0 - v1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-31684 is medium.
CVE-2022-31684 affects Tanzu VMware Reactor Netty by allowing a remote authenticated attacker to obtain sensitive information.
An attacker can exploit CVE-2022-31684 by gaining access to the log file and obtaining valid access tokens information.
The affected software for CVE-2022-31684 includes Tanzu VMware Reactor Netty version up to and excluding 1.0.24, and IBM Disconnected Log Collector versions v1.0 to v1.8.2.
To fix CVE-2022-31684, update Tanzu VMware Reactor Netty to version 1.0.24 or apply the appropriate remedy from IBM for Disconnected Log Collector.