Vulnerability Description
A flaw was found in Undertow, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2024:1674
- https://access.redhat.com/errata/RHSA-2024:1675
- https://access.redhat.com/errata/RHSA-2024:1676
- https://access.redhat.com/errata/RHSA-2024:1677
- https://access.redhat.com/errata/RHSA-2024:2763
- https://access.redhat.com/errata/RHSA-2024:2764
- https://access.redhat.com/errata/RHSA-2024:3919
- https://access.redhat.com/security/cve/CVE-2023-4639
- https://bugzilla.redhat.com/show_bug.cgi?id=2166022
- https://security.netapp.com/advisory/ntap-20250207-0001/
FAQ
What is CVE-2023-4639?
CVE-2023-4639 is a vulnerability with a CVSS score of 7.4 (HIGH). A flaw was found in Undertow, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltra...
How severe is CVE-2023-4639?
CVE-2023-4639 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4639?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.