undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2019:2937 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2935 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2936 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2938 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2998 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3044 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3045 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3050 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3046 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0727 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184 | issue tracking vendor advisory |
https://github.com/undertow-io/undertow/pull/794 | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220210-0016/ | third party advisory |