First published: Wed May 24 2023(Updated: )
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Undertow | <2.2.24 | |
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform | =4.12 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.9 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.10 | |
Redhat Openshift Container Platform For Power | =4.9 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Jboss Enterprise Application Platform Text-only Advisories | ||
Redhat Single Sign-on | ||
Redhat Single Sign-on | =7.6 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Jboss Enterprise Application Platform | =7.4 | |
maven/io.undertow:undertow-parent | <2.2.24.Final | 2.2.24.Final |
redhat/undertow | <2.2.24 | 2.2.24 |
All of | ||
Any of | ||
Redhat Openshift Container Platform | =4.11 | |
Redhat Openshift Container Platform | =4.12 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.9 | |
Redhat Openshift Container Platform For Ibm Linuxone | =4.10 | |
Redhat Openshift Container Platform For Power | =4.9 | |
Redhat Openshift Container Platform For Power | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
All of | ||
Redhat Single Sign-on | =7.6 | |
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
All of | ||
Redhat Jboss Enterprise Application Platform | =7.4 | |
Any of | ||
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
<2.2.24 | ||
All of | ||
Any of | ||
=4.11 | ||
=4.12 | ||
=4.9 | ||
=4.10 | ||
=4.9 | ||
=4.10 | ||
=8.0 | ||
All of | ||
=7.6 | ||
Any of | ||
=7.0 | ||
=8.0 | ||
=9.0 | ||
All of | ||
=7.4 | ||
Any of | ||
=7.0 | ||
=8.0 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3223 is a vulnerability found in undertow where servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content, allowing unauthorized users to cause a remote Denial of Service (DoS) attack.
CVE-2023-3223 has a severity rating of high.
The affected software includes undertow versions up to exclusive 2.2.24, Redhat Undertow, Redhat Openshift Container Platform versions 4.11 and 4.12, Redhat Openshift Container Platform For IBM Linuxone versions 4.9 and 4.10, Redhat Openshift Container Platform For Power versions 4.9 and 4.10, Redhat Single Sign-on version 7.6, Redhat Jboss Enterprise Application Platform version 7.4.
To fix CVE-2023-3223, update undertow to version 2.2.24 or undertow-parent to version 2.2.24.Final depending on the software used. For Redhat products, refer to the respective security advisories provided in the references section for more information on the fix.
You can find more information about CVE-2023-3223 in the Red Hat Security Advisories: RHSA-2023:4509, RHSA-2023:4505, and RHSA-2023:4506.