{"id":"CVE-2024-3653","details":"A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.","aliases":["GHSA-ch7q-gpff-h9hp"],"modified":"2025-01-09T04:48:40.727957Z","published":"2024-07-08T22:15:02Z","withdrawn":"2025-05-22T18:56:51.690827Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4392"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5143"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5144"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5145"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5147"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:6437"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274437"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-3653"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2024-3653"}],"affected":[{"package":{"name":"undertow","ecosystem":"Debian:13","purl":"pkg:deb/debian/undertow?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.18-1"}]}],"versions":["1.3.11-1","1.3.16-1","1.3.19-1","1.3.21-1","1.3.23-1","1.3.4-1","1.3.5-1","1.3.7-1","1.4.0-1","1.4.1-1","1.4.18-1","1.4.20-1","1.4.21-1","1.4.21-2","1.4.22-1","1.4.23-1","1.4.23-2","1.4.23-3","1.4.25-1","1.4.25-2","1.4.3-1","1.4.4-1","1.4.6-1","1.4.7-1","1.4.8-1","2.0.23-1","2.0.25-1","2.0.26-1","2.0.27-1","2.0.28-1","2.0.29-1","2.0.30-1","2.1.0-1","2.1.1-1","2.1.3-1","2.2.0-1","2.2.10-1","2.2.12-1","2.2.13-1","2.2.14-1","2.2.16-1","2.2.17-1","2.2.18-1","2.2.19-1","2.2.2-1","2.2.20-1","2.2.21-1","2.2.3-1","2.2.4-1","2.2.5-1","2.2.8-1","2.3.8-1","2.3.8-2"],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-3653.json"}}],"schema_version":"1.7.3"}