In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x
before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was
incomplete and invalid characters are still allowed in the query string and
path parameters. This could be exploited, in conjunction with a proxy that
also permitted the invalid characters but with a different interpretation,
to inject data into the HTTP response. By manipulating the HTTP response
the attacker could poison a web-cache, perform an XSS attack, or obtain
sensitive information from requests other than their own.
Upstream:released (1.4.23-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.4.23-3)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (1.4.23-3)
Ubuntu 20.10 (Groovy Gorilla):not-affected (1.4.23-3)
More Information

Updated: 2020-10-24 06:43:21 UTC (commit 69e225d81a6ee3e2e014950178db797c5d4e5009)