A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "4.0"
}
]
},
{
"cpe": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "4.0"
}
]
}
]
}{
"cpe": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.0.21"
}
]
}