CVE-2019-3888Log File Information Exposure in Redhat Undertow

Severity
9.8CRITICALNVD
EPSS
0.6%
top 31.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateJun 13

Description

A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

NVDredhat/undertow< 2.0.21
Debianredhat/undertow< 2.0.23-1
CVEListV5red_hat/undertow2.0.21

🔴Vulnerability Details

4
OSV
Credential exposure through log files in Undertow2019-06-13
GHSA
Credential exposure through log files in Undertow2019-06-13
OSV
CVE-2019-3888: A vulnerability was found in Undertow web server before 22019-06-12
CVEList
CVE-2019-3888: A vulnerability was found in Undertow web server before 22019-06-12

📋Vendor Advisories

2
Red Hat
undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed2019-06-10
Debian
CVE-2019-3888: undertow - A vulnerability was found in Undertow web server before 2.0.21. An information e...2019

💬Community

1
Bugzilla
CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed2019-03-28
CVE-2019-3888 — Log File Information Exposure in Redhat | cvebase