Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-2053

EPSS 0.30% · P54
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-2053

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Undertow 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Undertow是美国红帽(Red Hat)公司的一款基于Java的嵌入式Web服务器,是Wildfly(Java应用服务器)默认的Web服务器。 Red Hat Undertow 存在安全漏洞,该漏洞源于大型 AJP 请求可能导致 DoS。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Undertow Fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2 -

II. Public POCs for CVE-2022-2053

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-2053

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-08-05 · 27 CVEs total

CVE-2022-211869.8 CRITICALArbitrary Command Injection
CVE-2022-31659VMware Workspace One Access和VMware Identity Manager SQL注入漏洞
CVE-2022-37450Go Ethereum 安全漏洞
CVE-2022-35163Complete Online Job Search System 跨站脚本漏洞
CVE-2022-35162Complete Online Job Search System 跨站脚本漏洞
CVE-2022-27535Kaspersky VPN Secure Connection 安全漏洞
CVE-2022-2668Red Hat Keycloak 安全漏洞
CVE-2016-3098administrate 跨站请求伪造漏洞
CVE-2020-1754Moodle 安全漏洞
CVE-2020-1691Moodle 跨站脚本漏洞
CVE-2022-31657VMware Workspace One Access和VMware Identity Manager 输入验证错误漏洞
CVE-2022-31656多款VMware产品授权问题漏洞
CVE-2022-31658多款VMware产品注入漏洞
CVE-2022-31661多款VMware产品安全漏洞
CVE-2022-37434zlib 缓冲区错误漏洞
CVE-2022-31663多款VMware产品跨站脚本漏洞
CVE-2022-31664多款VMware产品安全漏洞
CVE-2022-31665多款VMware产品注入漏洞
CVE-2022-31660VMware Workspace One Access 权限许可和访问控制问题漏洞
CVE-2022-31662多款VMware产品路径遍历漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-2053

No comments yet


Leave a comment