io.undertow:undertow-core@2.3.0.Alpha2 vulnerabilities

  • latest version

    2.3.12.Final

  • first published

    11 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the io.undertow:undertow-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

io.undertow:undertow-core is a Java web server based on non-blocking IO.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. An attacker can disrupt service availability by repeatedly sending AJP requests that exceed the configured max-header-size attribute in ajp-listener, leading to the server closing the TCP connection without returning an AJP response.

Note:

This is only exploitable if the max-header-size is set to 64 KB or less.

How to fix Allocation of Resources Without Limits or Throttling?

Upgrade io.undertow:undertow-core to version 2.3.12.Final or higher.

[,2.3.12.Final)
  • H
Improper Input Validation

io.undertow:undertow-core is a Java web server based on non-blocking IO.

Affected versions of this package are vulnerable to Improper Input Validation via the FormAuthenticationMechanism. An attacker can exhaust the server's memory, leading to a Denial of Service by sending crafted requests that cause an OutofMemory error.

How to fix Improper Input Validation?

Upgrade io.undertow:undertow-core to version 2.3.13.Final or higher.

[,2.3.13.Final)
  • M
Denial of Service (DoS)

io.undertow:undertow-core is a Java web server based on non-blocking IO.

Affected versions of this package are vulnerable to Denial of Service (DoS) in flow control handling by the browser over HTTP/2. This may cause overhead or a denial of service in the server. This is due to an incomplete fix of CVE-2021-3629.

How to fix Denial of Service (DoS)?

Upgrade io.undertow:undertow-core to version 2.2.25.Final, 2.3.6.Final or higher.

[0,2.2.25.Final) [2.3.0.Alpha1,2.3.6.Final)
  • H
Improper Certificate Validation

io.undertow:undertow-core is a Java web server based on non-blocking IO.

Affected versions of this package are vulnerable to Improper Certificate Validation via the undertow client which does not check the server identity presented by the server certificate in https connections.

How to fix Improper Certificate Validation?

Upgrade io.undertow:undertow-core to version 2.2.24.Final, 2.3.5.Final or higher.

[0,2.2.24.Final) [2.3.0.Alpha1,2.3.5.Final)