CVE-2023-4639: Undertow incorrectly parses cookies
(updated )
A flaw was found in Undertow, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.
References
- access.redhat.com/errata/RHSA-2024:1674
- access.redhat.com/errata/RHSA-2024:1675
- access.redhat.com/errata/RHSA-2024:1676
- access.redhat.com/errata/RHSA-2024:1677
- access.redhat.com/errata/RHSA-2024:2763
- access.redhat.com/errata/RHSA-2024:2764
- access.redhat.com/errata/RHSA-2024:3919
- access.redhat.com/security/cve/CVE-2023-4639
- bugzilla.redhat.com/show_bug.cgi?id=2166022
- github.com/advisories/GHSA-3jrv-jgp8-45v3
- github.com/undertow-io/undertow
- github.com/undertow-io/undertow/commit/1f93a979d2ac264798e5779b5b7172dfafe0066f
- nvd.nist.gov/vuln/detail/CVE-2023-4639
Detect and mitigate CVE-2023-4639 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →