Lucene search

K
nvd[email protected]NVD:CVE-2022-1319
HistoryAug 31, 2022 - 4:15 p.m.

CVE-2022-1319

2022-08-3116:15:09
CWE-252
web.nvd.nist.gov
undertow
eap 7
response packets
connection reuse

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

71.4%

A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.

Affected configurations

NVD
Node
redhatopenshift_application_runtimesMatch-
OR
redhatsingle_sign-onMatch7.0
OR
redhatundertowRange<2.2.17
OR
redhatundertowMatch2.2.17-
OR
redhatundertowMatch2.2.17sp1
OR
redhatundertowMatch2.2.17sp2
OR
redhatundertowMatch2.2.19-
OR
redhatundertowMatch2.2.19sp1
OR
redhatundertowMatch2.3.0alpha1
Node
netappactive_iq_unified_managerMatch-linux
OR
netappactive_iq_unified_managerMatch-vmware_vsphere
OR
netappactive_iq_unified_managerMatch-windows
OR
netappcloud_secure_agentMatch-
OR
netapponcommand_insightMatch-
OR
netapponcommand_workflow_automationMatch-

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

71.4%