First published: Fri Aug 16 2024(Updated: )
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.
Affected Software | Affected Version | How to fix |
---|---|---|
Undertow |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2305290 is moderate due to potential information leakage between requests.
To fix REDHAT-BUG-2305290, update to the patched version of Undertow as released by Red Hat.
REDHAT-BUG-2305290 affects multiple versions of Undertow where the ProxyProtocolReadListener is utilized.
REDHAT-BUG-2305290 is a vulnerability related to improper handling of a shared StringBuilder in HTTP requests.
Exploitation of REDHAT-BUG-2305290 requires specific conditions and may not be easily achievable without access to the HTTP connection.