First published: Fri Aug 16 2024(Updated: )
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.undertow:undertow-core | >=2.3.0.Alpha1<2.3.17.Final | 2.3.17.Final |
maven/io.undertow:undertow-core | <2.2.36.Final | 2.2.36.Final |
Hawt.io | ||
Red Hat Build of Apache Camel for Spring Boot | ||
Keycloak | ||
Red Hat Data Grid | =8.0.0 | |
Apache Camel | ||
redhat jboss enterprise application platform | =7.0.0 | |
redhat jboss enterprise application platform | =8.0.0 | |
Red Hat JBoss Fuse | =7.0.0 | |
Red Hat Process Automation Manager | =7.0 | |
redhat single sign-on | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-7885 is classified as high due to potential information disclosure risks.
To fix CVE-2024-7885, upgrade to Undertow version 2.3.17.Final or 2.2.36.Final.
CVE-2024-7885 affects Undertow versions from 2.3.0.Alpha1 up to 2.3.17.Final, and any versions prior to 2.2.36.Final.
CVE-2024-7885 is a vulnerability related to improper handling of input due to the reuse of a StringBuilder instance.
CVE-2024-7885 impacts various Red Hat software packages including JBoss, Data Grid, and Keycloak.