A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
The product writes sensitive information to a log file.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3888 | vendor advisory issue tracking |
http://www.securityfocus.com/bid/108739 | third party advisory vdb entry |
https://access.redhat.com/errata/RHSA-2019:2439 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2998 | vendor advisory |
https://access.redhat.com/errata/RHSA-2020:0727 | vendor advisory |
https://security.netapp.com/advisory/ntap-20220210-0019/ | third party advisory |