HIGH · 7.5

CVE-2024-7885

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method proces...

Vulnerability Description

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
RedhatBuild Of Apache Camel - Hawtio-
RedhatBuild Of Apache Camel For Spring Boot-
RedhatBuild Of Keycloak-
RedhatData Grid8.0.0
RedhatIntegration Camel K-
RedhatJboss Enterprise Application Platform7.0.0
RedhatJboss Fuse7.0.0
RedhatProcess Automation7.0
RedhatSingle Sign-On7.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-7885?

CVE-2024-7885 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method proces...

How severe is CVE-2024-7885?

CVE-2024-7885 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-7885?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Build Of Apache Camel - Hawtio, Redhat Build Of Apache Camel For Spring Boot, Redhat Build Of Keycloak, Redhat Data Grid, Redhat Integration Camel K.