<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for undertow is now available for openEuler-24.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1257</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-03-07</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-03-07</InitialReleaseDate>
		<CurrentReleaseDate>2025-03-07</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-03-07</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">undertow security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for undertow is now available for openEuler-24.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Java web server using non-blocking IO

Security Fix(es):

undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.(CVE-2017-12196)

undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.(CVE-2019-10184)

A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user&apos;s credentials from the log files.(CVE-2019-10212)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for undertow is now available for openEuler-24.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">undertow</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1257</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2017-12196</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-10184</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-10212</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2017-12196</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-10184</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-10212</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="undertow-1.4.0-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">undertow-1.4.0-10.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-javadoc-1.4.0-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">undertow-javadoc-1.4.0-10.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">undertow-1.4.0-9.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-javadoc-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">undertow-javadoc-1.4.0-9.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">undertow-1.4.0-9.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-javadoc-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">undertow-javadoc-1.4.0-9.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">undertow-1.4.0-9.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-javadoc-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">undertow-javadoc-1.4.0-9.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">undertow-1.4.0-10.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="undertow-javadoc-1.4.0-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">undertow-javadoc-1.4.0-10.oe2403.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="undertow-1.4.0-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">undertow-1.4.0-10.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">undertow-1.4.0-9.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">undertow-1.4.0-9.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">undertow-1.4.0-9.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="undertow-1.4.0-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">undertow-1.4.0-10.oe2403.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2017-12196</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.9</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>undertow security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1257</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2019-10184</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>undertow security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1257</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user&apos;s credentials from the log files.</Note>
		</Notes>
		<ReleaseDate>2025-03-07</ReleaseDate>
		<CVE>CVE-2019-10212</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>undertow security update</Description>
				<DATE>2025-03-07</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1257</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>