<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Undertow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/undertow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 30 Mar 2026 11:24:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/undertow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Red Hat Undertow Multiple Vulnerabilities Allow Security Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-03-redhat-undertow/</link><pubDate>Mon, 30 Mar 2026 11:24:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-redhat-undertow/</guid><description>An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat Undertow to bypass security measures, manipulate data, and disclose sensitive information.</description><content:encoded><![CDATA[<p>Red Hat Undertow is vulnerable to multiple security flaws that could allow an unauthenticated, remote attacker to bypass security restrictions, manipulate data, and expose sensitive information. The specifics of these vulnerabilities are not detailed, but the advisory indicates a high severity due to the potential impact. Without further information, defenders should assume all versions of Undertow are affected. This lack of specific CVEs or exploitation details makes precise mitigation challenging. Defenders should focus on broad detection strategies for anomalous activity related to Undertow deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Red Hat Undertow instance exposed to the internet.</li>
<li>The attacker sends a specially crafted HTTP request designed to exploit one of the undisclosed vulnerabilities.</li>
<li>The vulnerable Undertow instance processes the malicious request, leading to a security bypass.</li>
<li>The attacker exploits the bypassed security measure to manipulate data within the application.</li>
<li>The attacker leverages another vulnerability to gain unauthorized access to sensitive information stored within the application or backend systems.</li>
<li>The attacker exfiltrates the compromised data or uses it to further compromise the system.</li>
<li>The attacker maintains persistence by creating backdoors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to significant data breaches, unauthorized modification of critical application data, and complete compromise of the affected system. The lack of specific vulnerability details makes it difficult to quantify the exact number of potential victims or targeted sectors. The impact ranges from data theft and service disruption to complete system takeover, depending on the specific vulnerabilities exploited and the application&rsquo;s role.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs (category: webserver, product: linux) for suspicious HTTP requests, particularly those with unusual URI patterns or excessive length, using the provided Sigma rule.</li>
<li>Implement rate limiting and input validation on all Undertow deployments to mitigate potential exploitation attempts.</li>
<li>Review access control configurations for all applications using Undertow to ensure least privilege principles are enforced.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>redhat</category><category>undertow</category><category>security-bypass</category><category>information-disclosure</category><category>data-manipulation</category></item><item><title>Undertow Request Smuggling Vulnerability (CVE-2026-28368)</title><link>https://feed.craftedsignal.io/briefs/2026-03-undertow-request-smuggling/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-undertow-request-smuggling/</guid><description>CVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.</description><content:encoded>&lt;p>CVE-2026-28368 is a critical vulnerability found in the Undertow web server. This flaw enables a remote attacker to craft specialized HTTP requests that Undertow parses differently compared to upstream proxies. This discrepancy allows attackers to conduct request smuggling attacks, effectively bypassing security measures and potentially gaining unauthorized access to sensitive resources. The vulnerability stems from inconsistent interpretation of HTTP requests, which is a common issue in web…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>undertow</category><category>request-smuggling</category><category>cve-2026-28368</category></item><item><title>Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)</title><link>https://feed.craftedsignal.io/briefs/2026-03-undertow-smuggling/</link><pubDate>Fri, 27 Mar 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-undertow-smuggling/</guid><description>A remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.</description><content:encoded>&lt;p>CVE-2026-28367 is a request smuggling vulnerability found in Undertow, a flexible performant server-side Java web server. The vulnerability arises from improper handling of HTTP header block terminators. Specifically, a remote attacker can send &lt;code>\r\r\r&lt;/code> as a header block terminator, which can be misinterpreted by certain proxy servers. This allows the attacker to potentially smuggle malicious requests, bypassing security controls and gaining unauthorized access to resources or manipulating…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>request-smuggling</category><category>undertow</category><category>webserver</category></item><item><title>Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-jboss-vulns/</link><pubDate>Wed, 25 Mar 2026 10:23:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jboss-vulns/</guid><description>An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within the Red Hat JBoss Enterprise Application Platform. An unauthenticated, remote attacker can exploit these flaws to trigger a denial-of-service (DoS) condition, manipulate sensitive data, and facilitate subsequent attacks, including cache poisoning and session hijacking. The vulnerabilities exist in the Undertow component. While specific CVEs are not listed in the advisory, the impact could be significant, leading to service disruption and potential data compromise. Defenders should focus on patching and monitoring for suspicious activity targeting JBoss instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable JBoss Enterprise Application Platform instance running an outdated version of Undertow.</li>
<li>The attacker sends a specially crafted HTTP request designed to exploit a specific vulnerability within Undertow&rsquo;s request processing logic.</li>
<li>If the vulnerability leads to a DoS, the server&rsquo;s resources are exhausted, causing it to become unresponsive to legitimate requests.</li>
<li>If the vulnerability allows data manipulation, the attacker modifies application data via HTTP requests.</li>
<li>For cache poisoning, the attacker crafts a request that, when cached by the application or a proxy, serves malicious content to other users.</li>
<li>For session hijacking, the attacker exploits a vulnerability that allows them to steal or forge user session IDs.</li>
<li>The attacker uses the hijacked session to impersonate a legitimate user and gain unauthorized access to sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant disruption of services relying on the JBoss Enterprise Application Platform. This includes denial-of-service conditions, potentially impacting business operations and user experience. Data manipulation could lead to data corruption or unauthorized modification of sensitive information. Cache poisoning can spread malicious content to a wide range of users. Session hijacking allows attackers to gain unauthorized access, potentially leading to data breaches or further malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Examine web server logs for abnormal HTTP requests that could indicate exploitation attempts (see example Sigma rule for detecting suspicious HTTP methods).</li>
<li>Monitor network traffic for unusual patterns that may indicate denial-of-service attacks targeting JBoss servers.</li>
<li>Implement a Web Application Firewall (WAF) to filter out malicious requests and protect against common web exploits.</li>
<li>Apply the latest patches and updates for Red Hat JBoss Enterprise Application Platform, focusing on the Undertow component, to remediate the underlying vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>jboss</category><category>undertow</category><category>denial-of-service</category><category>cache-poisoning</category><category>session-hijacking</category><category>webserver</category></item></channel></rss>