A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "6.0.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:undertow:2.0.0:sp1:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.0-sp1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:undertow:2.0.25:sp1:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.25-sp1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:undertow:2.0.26:sp3:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.26-sp3"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:undertow:2.0.28:sp1:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.28-sp1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:undertow:2.0.28:sp2:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.28-sp2"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.1.0"
}
]
}