DEBIAN-CVE-2026-28367

Source
https://security-tracker.debian.org/tracker/CVE-2026-28367
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28367.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-28367
Upstream
  • CVE-2026-28367
Published
2026-03-27T17:16:27.750Z
Modified
2026-04-11T09:00:37.355193Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending \r\r\r as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.

References

Affected packages

Debian:14 / undertow

Package

Name
undertow
Purl
pkg:deb/debian/undertow?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.4-1
1.3.5-1
1.3.7-1
1.3.11-1
1.3.16-1
1.3.19-1
1.3.21-1
1.3.23-1
1.4.0-1
1.4.1-1
1.4.3-1
1.4.4-1
1.4.6-1
1.4.7-1
1.4.8-1
1.4.18-1
1.4.20-1
1.4.21-1
1.4.21-2
1.4.22-1
1.4.23-1
1.4.23-2
1.4.23-3
1.4.25-1
1.4.25-2
2.*
2.0.23-1
2.0.25-1
2.0.26-1
2.0.27-1
2.0.28-1
2.0.29-1
2.0.30-1
2.1.0-1
2.1.1-1
2.1.3-1
2.2.0-1
2.2.2-1
2.2.3-1
2.2.4-1
2.2.5-1
2.2.8-1
2.2.10-1
2.2.12-1
2.2.13-1
2.2.14-1
2.2.16-1
2.2.17-1
2.2.18-1
2.2.19-1
2.2.20-1
2.2.21-1
2.3.8-1
2.3.8-2
2.3.18-1
2.3.18-2
2.3.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28367.json"