{ "schema_version": "1.4.0", "id": "GHSA-p9w3-gwc2-cr49", "modified": "2022-02-11T21:12:07Z", "published": "2021-04-30T17:28:52Z", "aliases": [ "CVE-2020-10687" ], "summary": "HTTP Request Smuggling in Undertow", "details": "A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "Maven", "name": "io.undertow:undertow-core" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.2.0.Final" } ] } ], "database_specific": { "last_known_affected_version_range": "<= 2.1.0.Final" } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10687" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785049" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220210-0015" } ], "database_specific": { "cwe_ids": [ "CWE-444" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-04-28T16:14:25Z", "nvd_published_at": "2020-09-23T13:15:00Z" } }