7.5
CWE
362
EPSS
0.098%
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2024-7885: Undertow: improper state management in proxy protocol parsing causes information leakage

First published: Fri Aug 16 2024(Updated: )

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

Credit: secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Redhat Build Of Apache Camel - Hawtio
Redhat Build Of Apache Camel For Spring Boot
Redhat Build Of Keycloak
Redhat Data Grid=8.0.0
Redhat Integration Camel K
Redhat Jboss Enterprise Application Platform=7.0.0
Redhat Jboss Enterprise Application Platform=8.0.0
Redhat Jboss Fuse=7.0.0
Redhat Process Automation=7.0
Redhat Single Sign-on=7.0
maven/io.undertow:undertow-core>=2.3.0.Alpha1<2.3.17.Final
2.3.17.Final
maven/io.undertow:undertow-core<2.2.36.Final
2.2.36.Final

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203