Search for packages
| purl | pkg:maven/org.wildfly/wildfly-undertow@11.0.0.Beta1 |
| Next non-vulnerable version | 12.0.0.Final |
| Latest non-vulnerable version | 12.0.0.Final |
| Risk | 3.9 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-zku3-qq4e-7fes
Aliases: CVE-2018-1047 GHSA-fmr4-w67p-vh8x |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-tzmu-y1p4-8bac | Uncontrolled Resource Consumption Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection. |
CVE-2016-9589
GHSA-p4xg-cpr9-vwvj |