Your message dated Sun, 6 May 2018 21:38:09 +0200
with message-id <91171867-7d8b-c53d-14c9-223822ec9...@debian.org>
and subject line Re: CVE-2018-1048: ALLOW_ENCODED_SLASH option not taken into 
account in the AjpRequestParser
has caused the Debian Bug report #891928,
regarding CVE-2018-1048: ALLOW_ENCODED_SLASH option not taken into account in 
the AjpRequestParser
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
891928: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891928
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: undertow
Version: 1.4.8-1+deb9u1
Severity: grave
Tags: security
Forwarded: https://issues.jboss.org/browse/UNDERTOW-1245

It was found that the AJP connector in undertow, as shipped in Jboss
EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus
allow the the slash / anti-slash characters encoded in the url which
may lead to path traversal and result in the information disclosure of
arbitrary local files.

Upstream bug:

https://issues.jboss.org/browse/UNDERTOW-1245

This was apparently fixed in 1.4.22.

--- End Message ---
--- Begin Message ---
I am going to close this bug report because CVE-2018-1048 will not be
fixed in Stretch. As discussed with the security team the package will
be removed instead.

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---

Reply via email to