CVE-2017-2666
27.07.2018, 14:29
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
Vendor | Product | Version |
---|---|---|
redhat | undertow | - |
redhat | jboss_enterprise_application_platform | 7.0.0 |
redhat | jboss_enterprise_application_platform | 7.1.0 |
redhat | jboss_enterprise_application_platform | 7.0.0 |
redhat | jboss_enterprise_application_platform | 7.1.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
undertow |
|
References