You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A flaw was found in Undertow package. Using the "FormAuthenticationMechanism", a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an "OutofMemory" error, exhausting the server's memory. This issue affects packages undertow-servlet and undertow-core in versions prior to 2.2.32.Final, and 2.3.x prior to 2.3.13.Final.
HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master
Description
A flaw was found in Undertow package. Using the "FormAuthenticationMechanism", a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an "OutofMemory" error, exhausting the server's memory. This issue affects packages undertow-servlet and undertow-core in versions prior to 2.2.32.Final, and 2.3.x prior to 2.3.13.Final.
HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master
Vulnerability ID: CVE-2023-1973
Package Name: io.undertow:undertow-core
Severity: HIGH
CVSS Score: 7.5
Publish Date: 2024-04-05T09:44:00
Current Package Version: 2.0.9.Final
Remediation Upgrade Recommendation: 2.3.16.SP1-redhat-00001
Link To SCA
Reference – NVD link
The text was updated successfully, but these errors were encountered: