Undertow AJP max-header-size DoS via mod_cluster error state
CVE-2023-5379 Published on December 12, 2023

Undertow: ajp request closes connection exceeding maxrequestsize
A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).

Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2023-5379 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Timeline

Reported to Red Hat.

Made public. 69 days later.

Weakness Type

Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.


Products Associated with CVE-2023-5379

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-5379 are published in these products:

 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7: Red Hat build of Quarkus: Red Hat Data Grid 8: Red Hat Decision Manager 7: Red Hat Fuse 7: Red Hat JBoss Data Grid 7: Red Hat JBoss Enterprise Application Platform 7: Red Hat JBoss Fuse 6: Red Hat Process Automation 7: Red Hat Single Sign-On 7: Red Hat support for Spring Boot:

Exploit Probability

EPSS
0.14%
Percentile
33.94%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.