A flaw was found in Undertow, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sun, 17 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 17 Nov 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | undertow: Cookie Smuggling/Spoofing | Undertow: cookie smuggling/spoofing |
First Time appeared |
Redhat camel Quarkus
Redhat camel Spring Boot Redhat integration Redhat jboss Data Grid Redhat jboss Enterprise Bpms Platform Redhat jboss Enterprise Brms Platform Redhat jboss Fuse Redhat jboss Fuse Service Works Redhat migration Toolkit Applications Redhat quarkus Redhat red Hat Single Sign On Redhat service Registry |
|
CPEs | cpe:/a:redhat:camel_quarkus:2 cpe:/a:redhat:camel_spring_boot:3 cpe:/a:redhat:integration:1 cpe:/a:redhat:jboss_data_grid:7 cpe:/a:redhat:jboss_data_grid:8 cpe:/a:redhat:jboss_enterprise_application_platform:6 cpe:/a:redhat:jboss_enterprise_bpms_platform:7 cpe:/a:redhat:jboss_enterprise_brms_platform:7 cpe:/a:redhat:jboss_fuse:6 cpe:/a:redhat:jboss_fuse:7 cpe:/a:redhat:jboss_fuse_service_works:6 cpe:/a:redhat:migration_toolkit_applications:6 cpe:/a:redhat:quarkus:2 cpe:/a:redhat:red_hat_single_sign_on:7 cpe:/a:redhat:service_registry:2 |
|
Vendors & Products |
Redhat camel Quarkus
Redhat camel Spring Boot Redhat integration Redhat jboss Data Grid Redhat jboss Enterprise Bpms Platform Redhat jboss Enterprise Brms Platform Redhat jboss Fuse Redhat jboss Fuse Service Works Redhat migration Toolkit Applications Redhat quarkus Redhat red Hat Single Sign On Redhat service Registry |
|
References |
|
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-07T17:02:40.205Z
Reserved: 2023-08-30T14:52:04.007Z
Link: CVE-2023-4639

Updated: 2025-02-07T17:02:40.205Z

Status : Awaiting Analysis
Published: 2024-11-17T11:15:05.840
Modified: 2025-02-07T17:15:29.713
Link: CVE-2023-4639
