Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1490301 - (CVE-2017-12165) CVE-2017-12165 undertow: improper whitespace parsing leading to potential HTTP request smuggling
CVE-2017-12165 undertow: improper whitespace parsing leading to potential HTT...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20171213,reported=2...
: Security
Depends On: 1515024
Blocks: 1481669 1520314
  Show dependency treegraph
 
Reported: 2017-09-11 05:46 EDT by Bharti Kundal
Modified: 2018-10-19 17:43 EDT (History)
37 users (show)

See Also:
Fixed In Version: undertow 1.4.17, undertow 1.3.31, undertow 2.0.0
Doc Type: If docs needed, set a value
Doc Text:
It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3454 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:48:09 EST
Red Hat Product Errata RHSA-2017:3455 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:57:25 EST
Red Hat Product Errata RHSA-2017:3456 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:31:03 EST
Red Hat Product Errata RHSA-2017:3458 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2017-12-13 18:26:13 EST
Red Hat Product Errata RHSA-2018:0002 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 6 2018-01-03 10:30:20 EST
Red Hat Product Errata RHSA-2018:0003 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update 2018-01-03 10:20:33 EST
Red Hat Product Errata RHSA-2018:0004 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 7 2018-01-03 10:31:14 EST
Red Hat Product Errata RHSA-2018:0005 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2018-01-03 10:49:39 EST
Red Hat Product Errata RHSA-2018:1322 None None None 2018-05-03 15:05 EDT

  None (edit)
Description Bharti Kundal 2017-09-11 05:46:02 EDT
It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling.
Comment 2 Adam Mariš 2017-09-12 04:08:13 EDT
Acknowledgments:

Name: Stuart Douglas (Red Hat)
Comment 5 errata-xmlrpc 2017-12-13 12:38:11 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456
Comment 6 errata-xmlrpc 2017-12-13 13:29:27 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454
Comment 7 errata-xmlrpc 2017-12-13 13:45:09 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7

Via RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455
Comment 8 errata-xmlrpc 2017-12-13 13:55:32 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458
Comment 9 Markus Koschany 2017-12-28 12:48:31 EST
Could you share more information about the vulnerability please? What is the fixing commit in undertow's Git repository? 

https://github.com/undertow-io/undertow
Comment 11 errata-xmlrpc 2018-01-03 05:21:53 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2018:0003 https://access.redhat.com/errata/RHSA-2018:0003
Comment 12 errata-xmlrpc 2018-01-03 05:33:22 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2018:0002 https://access.redhat.com/errata/RHSA-2018:0002
Comment 13 errata-xmlrpc 2018-01-03 05:35:33 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2018:0004 https://access.redhat.com/errata/RHSA-2018:0004
Comment 14 errata-xmlrpc 2018-01-03 05:52:28 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2018:0005 https://access.redhat.com/errata/RHSA-2018:0005
Comment 15 Bharti Kundal 2018-01-08 01:16:47 EST
(In reply to Markus Koschany from comment #9)
> Could you share more information about the vulnerability please? What is the
> fixing commit in undertow's Git repository? 
> 
> https://github.com/undertow-io/undertow

Hi Markus,

Seems that this is being tracked here :https://issues.jboss.org/browse/UNDERTOW-1251 as far as I know.You can agther more information there.

Please let me know if you need more help.

Regards,
Bharti
Comment 16 errata-xmlrpc 2018-05-03 15:04:56 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2018:1322 https://access.redhat.com/errata/RHSA-2018:1322

Note You need to log in before you can comment on or make changes to this bug.