SB2021110530 - openEuler update for undertow



SB2021110530 - openEuler update for undertow

Published: November 5, 2021

Security Bulletin ID SB2021110530
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2019-3888)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange), which includes logging of user credentials. A local user can view contents of log files and gain access to credentials in plain text that are stored in them.


2) Memory leak (CVE-ID: CVE-2020-10705)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak when processing certain requests to the "Expect: 100-continue" header. A remote attacker can force the server to leak memory and perform denial of service attack.


3) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2020-10719)

The vulnerability allows a remote attacker to perform HTTP request smuggling attack.

The vulnerability exists due to improper input validation. A remote attacker can send a specially crafted HTTP request and perform HTTP request smuggling attack.


Remediation

Install update from vendor's website.