CVE-2020-1757:
Improper Input Validation in Undertow
8.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3644%
CWE
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
io.undertow:undertow-core | maven | <= 2.0.42 | 2.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper servletPath normalization where paths containing semicolons are truncated. This would occur in core path resolution functions:
- ServletPathMatches.getServletHandlerByPath - Directly handles application mapping logic described in the CVE
- HttpServletRequestImpl.getServletPath - Exposes the improperly normalized value to application code While no patch diffs are available, these functions are central to servlet path handling in Undertow and match the vulnerability description of incorrect truncation affecting security mappings. The 'high' confidence for ServletPathMatches comes from its direct role in path resolution, while 'medium' for getServletPath reflects its role in exposing the invalid value.