A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"326280464589427992575735744524297913233",
"114197148306807790186374633251240399393",
"157826366970093142056232081588463454150",
"124160317417894610465899165539382148470",
"193703900915413689060034964461335143365",
"174416569823837933819691547902972590876",
"205907144551855956498827172647116652313",
"298264564201812733016405914443669288133"
]
},
"target": {
"file": "core/src/main/java/io/undertow/server/protocol/ajp/AjpReadListener.java"
},
"signature_version": "v1",
"id": "CVE-2022-1319-1249844a",
"deprecated": false,
"source": "https://github.com/undertow-io/undertow/commit/1443a1a2bbb8e32e56788109d8285db250d55c8b"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "203608761728171268144996550627621916480",
"length": 4166.0
},
"target": {
"file": "core/src/main/java/io/undertow/server/protocol/ajp/AjpReadListener.java",
"function": "handleEvent"
},
"signature_version": "v1",
"id": "CVE-2022-1319-6199bdcb",
"deprecated": false,
"source": "https://github.com/undertow-io/undertow/commit/1443a1a2bbb8e32e56788109d8285db250d55c8b"
}
]