CVE-2020-10687

A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
VendorProductVersion
redhatundertow
𝑥
< 2.2.0
redhatjboss_enterprise_application_platform
-
redhatsingle_sign-on
-
redhatjboss_enterprise_application_platform
7.2
redhatjboss_enterprise_application_platform
7.3
redhatjboss_enterprise_application_platform
7.4
redhatjboss_enterprise_application_platform
7.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
undertow
sid
2.3.8-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
undertow
noble
needs-triage
mantic
dne
lunar
dne
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
needs-triage
eoan
ignored
bionic
needs-triage
xenial
needs-triage
trusty
dne