forked from CheckmarxDev/JavaVulnerableLab
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CX: CVE-2019-3888 in Maven-io.undertow:undertow-core and 2.0.9.Final @ RM_JavaVulnerableLab.refs/heads/master #1
Comments
Issue still exists. |
Issue still exists. |
Issue still exists. |
1 similar comment
Issue still exists. |
Issue still exists. |
Issue still exists. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
A vulnerability was found in Undertow web server up to 1.0.0.Alpha19, between 1.3.0.Beta9 to 1.3.0.Beta13, 1.3.0.CR.x, between 1.3.0.Final to 1.4.27.Final and 2.0.x before 2.0.20.Final. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
HIGH Vulnerable Package issue exists @ io.undertow:undertow-core in branch refs/heads/master
Vulnerability ID: CVE-2019-3888
Package Name: io.undertow:undertow-core
Severity: HIGH
CVSS Score: 9.8
Publish Date: 2019-06-12T14:29:00
Current Package Version: 2.0.9.Final
Remediation Upgrade Recommendation: 2.0.35.Final
Link To SCA
Reference – NVD link
The text was updated successfully, but these errors were encountered: