Search for vulnerabilities
Vulnerability details: VCID-vanc-nzh3-aaab
Vulnerability ID VCID-vanc-nzh3-aaab
Aliases CVE-2017-12165
GHSA-5gg7-5wv8-4gcj
Summary Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2017:3454
rhas Important https://access.redhat.com/errata/RHSA-2017:3455
rhas Important https://access.redhat.com/errata/RHSA-2017:3456
rhas Important https://access.redhat.com/errata/RHSA-2017:3458
rhas Important https://access.redhat.com/errata/RHSA-2018:0002
rhas Important https://access.redhat.com/errata/RHSA-2018:0003
rhas Important https://access.redhat.com/errata/RHSA-2018:0004
rhas Important https://access.redhat.com/errata/RHSA-2018:0005
rhas Moderate https://access.redhat.com/errata/RHSA-2018:1322
cvssv3 2.6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12165.json
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.00466 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01096 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01139 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
epss 0.02033 https://api.first.org/data/v1/epss?cve=CVE-2017-12165
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1490301
cvssv3.1 7.5 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-5gg7-5wv8-4gcj
cvssv3.1 7.5 https://github.com/undertow-io/undertow
generic_textual HIGH https://github.com/undertow-io/undertow
cvssv3.1 7.5 https://github.com/undertow-io/undertow/commit/1e72647818c9fb31b693a953b1ae595a6c82eb7f
generic_textual HIGH https://github.com/undertow-io/undertow/commit/1e72647818c9fb31b693a953b1ae595a6c82eb7f
cvssv3.1 7.5 https://github.com/undertow-io/undertow/commit/5b008b7ac312c6cdb76679ff58c43620bb79d44f
generic_textual HIGH https://github.com/undertow-io/undertow/commit/5b008b7ac312c6cdb76679ff58c43620bb79d44f
cvssv3.1 7.5 https://github.com/undertow-io/undertow/commit/691440ee58259fba76711b60d56dde6679808bdc
generic_textual HIGH https://github.com/undertow-io/undertow/commit/691440ee58259fba76711b60d56dde6679808bdc
cvssv3.1 7.5 https://issues.redhat.com/browse/UNDERTOW-1251
generic_textual HIGH https://issues.redhat.com/browse/UNDERTOW-1251
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2017-12165
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2017-12165
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12165.json
https://api.first.org/data/v1/epss?cve=CVE-2017-12165
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165
https://github.com/undertow-io/undertow
https://github.com/undertow-io/undertow/commit/1e72647818c9fb31b693a953b1ae595a6c82eb7f
https://github.com/undertow-io/undertow/commit/5b008b7ac312c6cdb76679ff58c43620bb79d44f
https://github.com/undertow-io/undertow/commit/691440ee58259fba76711b60d56dde6679808bdc
https://issues.redhat.com/browse/UNDERTOW-1251
1490301 https://bugzilla.redhat.com/show_bug.cgi?id=1490301
885338 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885338
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:undertow:2.0.0:alpha_1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:undertow:2.0.0:alpha_1:*:*:*:*:*:*
CVE-2017-12165 https://nvd.nist.gov/vuln/detail/CVE-2017-12165
GHSA-5gg7-5wv8-4gcj https://github.com/advisories/GHSA-5gg7-5wv8-4gcj
RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454
RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455
RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456
RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458
RHSA-2018:0002 https://access.redhat.com/errata/RHSA-2018:0002
RHSA-2018:0003 https://access.redhat.com/errata/RHSA-2018:0003
RHSA-2018:0004 https://access.redhat.com/errata/RHSA-2018:0004
RHSA-2018:0005 https://access.redhat.com/errata/RHSA-2018:0005
RHSA-2018:1322 https://access.redhat.com/errata/RHSA-2018:1322
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12165.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/undertow-io/undertow
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/undertow-io/undertow/commit/1e72647818c9fb31b693a953b1ae595a6c82eb7f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/undertow-io/undertow/commit/5b008b7ac312c6cdb76679ff58c43620bb79d44f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/undertow-io/undertow/commit/691440ee58259fba76711b60d56dde6679808bdc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://issues.redhat.com/browse/UNDERTOW-1251
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-12165
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-12165
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.75988
EPSS Score 0.00466
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.