You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
CVE-2022-1319 - High Severity Vulnerability
Vulnerable Library - undertow-core-2.0.19.Final.jar
Undertow
Path to dependency file: /spring-distributed-tracing/service-reservation/pom.xml
Path to vulnerable library: /root/.m2/repository/io/undertow/undertow-core/2.0.19.Final/undertow-core-2.0.19.Final.jar
Dependency Hierarchy:
Found in HEAD commit: 9195f72f46da004a0402ff532a458e5a041229d5
Found in base branch: master
Vulnerability Details
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
Publish Date: 2022-08-31
URL: CVE-2022-1319
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2022-1319
Release Date: 2022-08-31
Fix Resolution: io.undertow:undertow-core:2.2.18.Final,2.3.0.Final
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: