CVE-2024-3653
Description
A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.
CWE
- CWE-401 — Missing Release of Memory after Effective Lifetime
Affected
- / — v=0 ≤2.3.14.Final [affected]
- Red Hat / Red Hat build of Quarkus 3.8.6.redhat — v=5.2.4.redhat-00001 <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 7 —
- Red Hat / Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 — v=0:2.2.33-1.SP1_redhat_00001.1.el8eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 — v=0:2.2.33-1.SP1_redhat_00001.1.el9eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 — v=0:2.2.33-1.SP1_redhat_00001.1.el7eap <* [unaffected]
- Red Hat / Red Hat JBoss Enterprise Application Platform 8 —
- Red Hat / OpenShift Serverless —
- Red Hat / Red Hat build of Apache Camel 4 for Quarkus 3 —
- Red Hat / Red Hat build of Apache Camel for Spring Boot 4 —
- Red Hat / Red Hat build of Apache Camel - HawtIO 4 —
- Red Hat / Red Hat build of Apicurio Registry 2 —
- Red Hat / Red Hat Build of Keycloak —
- Red Hat / Red Hat build of OptaPlanner 8 —
- Red Hat / Red Hat build of Quarkus —
- Red Hat / Red Hat Data Grid 8 —
- Red Hat / Red Hat Fuse 7 —
- Red Hat / Red Hat Integration Camel K 1 —
- Red Hat / Red Hat Integration Camel Quarkus 2 —
- Red Hat / Red Hat JBoss Data Grid 7 —
- Red Hat / Red Hat JBoss Enterprise Application Platform Expansion Pack —
- Red Hat / Red Hat JBoss Fuse Service Works 6 —
- Red Hat / Red Hat Process Automation 7 —
- Red Hat / Red Hat Single Sign-On 7 —
- Red Hat / streams for Apache Kafka —
CVSS
- 3.1 score=5.3 severity=MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
- https://access.redhat.com/errata/RHSA-2024:4392 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:5143 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:5144 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:5145 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:5147 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/errata/RHSA-2024:6437 vendor-advisory, x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-3653 vdb-entry, x_refsource_REDHAT
- https://bugzilla.redhat.com/show_bug.cgi?id=2274437 issue-tracking, x_refsource_REDHAT
Source
cvelistV5-main/cves/2024/3xxx/CVE-2024-3653.json