2.3.18.Final
11 years ago
2 months ago
Known vulnerabilities in the io.undertow:undertow-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to HTTP Request Smuggling due to the interaction of quotation marks and delimiters in the How to fix HTTP Request Smuggling? Upgrade | [,2.2.30.Final)[2.3.0.Alpha1,2.3.11.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) through the wildfly-http-client protocol, due to the How to fix Denial of Service (DoS)? Upgrade | [,2.2.31.Final)[2.3.0.Final,2.3.12.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Race Condition due to the reuse of the This vulnerability primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments. How to fix Race Condition? Upgrade | [,2.2.36.Final)[2.3.0.Alpha1,2.3.17.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Memory Leak when the How to fix Memory Leak? Upgrade | [,2.2.37.Final)[2.3.0.Alpha1,2.3.18.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Uncontrolled Recursion in chunked response handling. An attacker can cause a client to wait indefinitely by sending excessive data without a Note: This is only exploitable when using How to fix Uncontrolled Recursion? Upgrade | [,2.2.34.Final)[2.3.0.Final,2.3.8.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Directory Traversal due to improper input validation of the HTTP request. An attacker can access privileged or restricted files and directories by appending a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP. How to fix Directory Traversal? Upgrade | [,2.2.33.Final)[2.3.0.Final,2.3.12.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption through the handling of URL-encoded request path information on How to fix Uncontrolled Resource Consumption? Upgrade | [,2.2.33.Final)[2.3.0.Final,2.3.14.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') due to insufficient limitations on the amount of How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? Upgrade | [,2.2.33.Final)[2.3.0.Final,2.3.14.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. An attacker can disrupt service availability by repeatedly sending AJP requests that exceed the configured Note: This is only exploitable if the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,2.2.31.Final)[2.3.0.Alpha1,2.3.12.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Improper Input Validation via the How to fix Improper Input Validation? Upgrade | [,2.2.32.Final)[2.3.0.Alpha1,2.3.13.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) in flow control handling by the browser over HTTP/2. This may cause overhead or a denial of service in the server. This is due to an incomplete fix of CVE-2021-3629. How to fix Denial of Service (DoS)? Upgrade | [0,2.2.25.Final)[2.3.0.Alpha1,2.3.6.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Improper Certificate Validation via the undertow client which does not check the server identity presented by the server certificate in https connections. How to fix Improper Certificate Validation? Upgrade | [0,2.2.24.Final)[2.3.0.Alpha1,2.3.5.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) in its use of the How to fix Denial of Service (DoS)? Upgrade | [,2.0.29.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) via an AJP 400 response, when EAP 7 is improperly sending two response packets, those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by How to fix Denial of Service (DoS)? Upgrade | [,2.2.18)[2.3.0.Alpha1,2.3.0.Alpha2) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) when a How to fix Denial of Service (DoS)? Upgrade | [,2.2.19.Final)[2.3.0.Alpha1,2.3.0.Alpha2) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) due to an issue in the flow control handling by the browser over How to fix Denial of Service (DoS)? Upgrade | [,2.0.40.Final)[2.1.0.Final,2.2.11.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) which would cause client side invocation timeout with certain calls made over HTTP2. How to fix Denial of Service (DoS)? Upgrade | [0,2.2.15.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) due to final frame write failure in How to fix Denial of Service (DoS)? Upgrade | [0,2.2.8.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to HTTP Request Smuggling. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. How to fix HTTP Request Smuggling? Upgrade | [2.1.0.Final,2.1.6.Final)[,2.0.34.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to HTTP Request Smuggling. A flaw was found in Undertow regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling. How to fix HTTP Request Smuggling? Upgrade | [,2.1.1.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS). Certain requests to the "Expect: 100-continue" header may cause an out of memory error. How to fix Denial of Service (DoS)? Upgrade | [,2.1.1.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Arbitrary File Upload. A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of How to fix Arbitrary File Upload? Upgrade | [,2.0.30) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Information Exposure via the DEBUG log for How to fix Information Exposure? Upgrade | [,2.0.21.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Information Exposure. Confidential information such as HTTP Authentication for How to fix Information Exposure? Upgrade | [,2.0.20.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Information Exposure. If all headers were not written out in the first How to fix Information Exposure? Upgrade | [,1.4.27.Final)[2.0.0.Final,2.0.15.Final) |
io.undertow:undertow-core is a High performance non-blocking webserver. Affected versions of this package are vulnerable to File Handler Leak via the How to fix File Handler Leak? Upgrade | [,2.0.5.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Denial of Service (DoS) attacks. Due to non-clean How to fix Denial of Service (DoS)? Upgrade | [,2.0.0.Beta1) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to CRLF Injection due to insufficient sanitization and validation of user input before the input is used as part of an HTTP header value. Note: this issue exists because of an incomplete fix for CVE-2016-4993 How to fix CRLF Injection? Upgrade | [,1.4.25.Final)[2.0.0.Final,2.0.5.Final) |
io.undertow:undertow-core is a Java web server based on non-blocking IO. Affected versions of this package are vulnerable to Directory Traversal. It does not use the How to fix Directory Traversal? Upgrade | [0,2.0.0.Beta1) |