CVE-2017-2666

MEDIUM

Redhat Undertow < 1.3.31 - HTTP Request Smuggling

Title source: rule

Description

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.

Exploits (3)

nomisec STUB
by dawetmaster · poc
https://github.com/dawetmaster/CVE-2017-2666-undertow-vulnerable
nomisec STUB
by andikahilmy · poc
https://github.com/andikahilmy/CVE-2017-2666-undertow-vulnerable
nomisec STUB
by tafamace · poc
https://github.com/tafamace/CVE-2017-2666

Scores

CVSS v3 6.5
EPSS 0.0139
EPSS Percentile 80.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Details

CWE
CWE-444
Status published
Products (6)
debian/debian_linux 9.0
debian/debian_linux 10.0
io.undertow/undertow-core 0 - 1.3.31Maven
redhat/jboss_enterprise_application_platform 7.0.0
redhat/jboss_enterprise_application_platform 7.1.0
redhat/undertow
Published Jul 27, 2018
Tracked Since Feb 18, 2026