Bug 2095862 (CVE-2022-2053) - CVE-2022-2053 undertow: Large AJP request may cause DoS
Summary: CVE-2022-2053 undertow: Large AJP request may cause DoS
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-2053
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2094369 2095888
TreeView+ depends on / blocked
 
Reported: 2022-06-10 18:58 UTC by Patrick Del Bello
Modified: 2022-12-08 21:03 UTC (History)
71 users (show)

Fixed In Version: undertow 2.2.19.Final, undertow 2.3.0.Alpha2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Undertow. AJP requests to the server may allow an attacker to send a malicious request and trigger server errors, resulting in a denial of service.
Clone Of:
Environment:
Last Closed: 2022-12-08 21:03:04 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6821 0 None None None 2022-10-05 16:35:10 UTC
Red Hat Product Errata RHSA-2022:6822 0 None None None 2022-10-05 16:39:23 UTC
Red Hat Product Errata RHSA-2022:6823 0 None None None 2022-10-05 16:32:41 UTC
Red Hat Product Errata RHSA-2022:6825 0 None None None 2022-10-05 16:46:55 UTC
Red Hat Product Errata RHSA-2022:8652 0 None None None 2022-11-28 14:39:52 UTC

Description Patrick Del Bello 2022-06-10 18:58:04 UTC
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while.

In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds).
In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable".

An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service)

Comment 5 errata-xmlrpc 2022-10-05 16:32:36 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2022:6823 https://access.redhat.com/errata/RHSA-2022:6823

Comment 6 errata-xmlrpc 2022-10-05 16:35:04 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2022:6821 https://access.redhat.com/errata/RHSA-2022:6821

Comment 7 errata-xmlrpc 2022-10-05 16:39:17 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2022:6822 https://access.redhat.com/errata/RHSA-2022:6822

Comment 8 errata-xmlrpc 2022-10-05 16:46:49 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2022:6825 https://access.redhat.com/errata/RHSA-2022:6825

Comment 11 errata-xmlrpc 2022-11-28 14:39:47 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.11.1

Via RHSA-2022:8652 https://access.redhat.com/errata/RHSA-2022:8652

Comment 12 Product Security DevOps Team 2022-12-08 21:03:00 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2053


Note You need to log in before you can comment on or make changes to this bug.