Home / CVE DB / CVE-2024-7885
Standard
Vulnerability Identifier

CVE-2024-7885

2024-08-21
Severity Assessment
7.5
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
None
Confidentiality
None
Integrity
High
Availability
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Weakness Classification

CWE-CWE-362

Affected Population

Affected Configurations

Total: 10 detected entries

Software List Scrollable
re
build_of_apache_camel_for_spring_boot
Vendor: redhat • v-
re
build_of_keycloak
Vendor: redhat • v-
re
jboss_enterprise_application_platform
Vendor: redhat • v8.0.0
re
process_automation
Vendor: redhat • v7.0
re
build_of_apache_camel_-_hawtio
Vendor: redhat • v-
re
single_sign-on
Vendor: redhat • v7.0
re
jboss_fuse
Vendor: redhat • v7.0.0
re
data_grid
Vendor: redhat • v8.0.0
re
jboss_enterprise_application_platform
Vendor: redhat • v7.0.0
re
integration_camel_k
Vendor: redhat • v-
Timeline

Time Line

PUBLICATION
21 Aug 2024
MODIFICATION
19 Jan 2026
FIRST PATCH
15 Jul 2025
Impact Statistics

Key Metrics

CVSS Score
7.5
HIGH
Products
10
Affected
Patches
2
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.