A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-1319 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2073890 | Issue Tracking Vendor Advisory |
https://github.com/undertow-io/undertow/commit/1443a1a2bbb8e32e56788109d8285db250d55c8b | Patch Third Party Advisory |
https://github.com/undertow-io/undertow/commit/7c5b3ab885b5638fd3f1e8a935d5063d68aa2df3 | Patch Third Party Advisory |
https://issues.redhat.com/browse/UNDERTOW-2060 | Issue Tracking Vendor Advisory |
https://security.netapp.com/advisory/ntap-20221014-0006/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2022-08-31 16:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-1319
Mitre link : CVE-2022-1319
CVE.ORG link : CVE-2022-1319
JSON object : View
Products Affected
redhat
- undertow
- openshift_application_runtimes
- single_sign-on
netapp
- cloud_secure_agent
- oncommand_insight
- active_iq_unified_manager
- oncommand_workflow_automation
CWE
CWE-252
Unchecked Return Value