Project Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Apache Camel Hawtio
Subscribe
Build Of Apache Camel - Hawtio
Subscribe
Build Of Apache Camel For Spring Boot
Subscribe
Camel Spring Boot
Subscribe
Data Grid
Subscribe
Enterprise Linux
Subscribe
Fuse
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Expansion Pack
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Fuse
Subscribe
Jbosseapxp
Subscribe
Process Automation
Subscribe
Red Hat Single Sign On
Subscribe
Undertow
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Apache Camel - Hawtio
Redhat build Of Apache Camel For Spring Boot Redhat data Grid Redhat fuse Redhat jboss Enterprise Application Platform Expansion Pack Redhat process Automation Redhat undertow |
|
| Vendors & Products |
Redhat build Of Apache Camel - Hawtio
Redhat build Of Apache Camel For Spring Boot Redhat data Grid Redhat fuse Redhat jboss Enterprise Application Platform Expansion Pack Redhat process Automation Redhat undertow |
Tue, 24 Mar 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the server prematurely parses and stores this content to disk. This could lead to resource exhaustion, potentially resulting in a Denial of Service (DoS). | |
| Title | Undertow: undertow: denial of service due to premature multipart/form-data parsing in get requests | |
| First Time appeared |
Redhat
Redhat apache Camel Hawtio Redhat camel Spring Boot Redhat enterprise Linux Redhat jboss Data Grid Redhat jboss Enterprise Application Platform Redhat jboss Enterprise Bpms Platform Redhat jboss Fuse Redhat jbosseapxp Redhat red Hat Single Sign On |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:/a:redhat:apache_camel_hawtio:4 cpe:/a:redhat:camel_spring_boot:4 cpe:/a:redhat:jboss_data_grid:8 cpe:/a:redhat:jboss_enterprise_application_platform:7 cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jboss_enterprise_bpms_platform:7 cpe:/a:redhat:jboss_fuse:7 cpe:/a:redhat:jbosseapxp cpe:/a:redhat:red_hat_single_sign_on:7 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat apache Camel Hawtio Redhat camel Spring Boot Redhat enterprise Linux Redhat jboss Data Grid Redhat jboss Enterprise Application Platform Redhat jboss Enterprise Bpms Platform Redhat jboss Fuse Redhat jbosseapxp Redhat red Hat Single Sign On |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-24T04:12:01.834Z
Reserved: 2026-02-26T14:22:15.920Z
Link: CVE-2026-3260
No data.
Status : Received
Published: 2026-03-24T05:16:24.073
Modified: 2026-03-24T05:16:24.073
Link: CVE-2026-3260
OpenCVE Enrichment
Updated: 2026-03-24T10:29:05Z