We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-4109

Undertow: information leakage via http/2 request header reuse



Description

A flaw was found in Undertow. An HTTP request header value from a previous stream may be incorrectly reused for a request associated with a subsequent stream on the same HTTP/2 connection. This issue can potentially lead to information leakage between requests.

Reserved 2024-04-24 | Published 2024-12-12 | Updated 2024-12-12 | Assigner redhat


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Default status
unknown

Timeline

2024-03-30:Reported to Red Hat.
2024-12-10:Made public.

References

access.redhat.com/security/cve/CVE-2024-4109 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2272325 (RHBZ#2272325) issue-tracking

cve.org (CVE-2024-4109)

nvd.nist.gov (CVE-2024-4109)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-4109

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.