CVE-2020-1757

EUVD-2022-2061
A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
redhatCNA
8.1 HIGH
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
Affected Products (NVD)
VendorProductVersion
redhatundertow
𝑥
< 2.1.0
redhatundertow
2.0.0:sp1
redhatundertow
2.0.25:sp1
redhatundertow
2.0.26:sp3
redhatundertow
2.0.28:sp1
redhatundertow
2.0.28:sp2
redhatjboss_data_grid
7.0.0
redhatjboss_enterprise_application_platform
7.0.0
redhatjboss_fuse
6.0.0
redhatjboss_fuse
7.0.0
redhatopenshift_application_runtimes
-
redhatsingle_sign-on
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
undertow
sid
2.3.8-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
undertow
bionic
needs-triage
eoan
ignored
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
dne
mantic
dne
noble
needs-triage
trusty
dne
xenial
needs-triage