Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5379: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7

0
High
VulnerabilityCVE-2023-5379cvecve-2023-5379
Published: Tue Dec 12 2023 (12/12/2023, 21:54:52 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7

Description

A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).

AI-Powered Analysis

AILast updated: 11/07/2025, 11:28:35 UTC

Technical Analysis

CVE-2023-5379 is a vulnerability identified in the Undertow web server component used by Red Hat JBoss Enterprise Application Platform (EAP) 7.1 EUS running on Red Hat Enterprise Linux 7. The flaw arises when an Apache JServ Protocol (AJP) request exceeds the configured max-header-size attribute in the ajp-listener configuration. Under these conditions, the JBoss EAP instance enters an error state as detected by mod_cluster in the Apache httpd server. Specifically, when the backend JBoss EAP closes the TCP connection without returning an AJP response due to the oversized header, mod_proxy_cluster marks the instance as an error worker and ceases forwarding requests to it. This behavior can be exploited by an unauthenticated attacker who repeatedly sends AJP requests with headers exceeding the max-header-size, causing a denial of service by effectively taking the JBoss EAP instance offline from the load balancer's perspective. The vulnerability has a CVSS 3.1 score of 7.5 (high), reflecting its network attack vector, low complexity, no privileges or user interaction required, and a significant impact on confidentiality due to the potential for service disruption and information exposure through error states. While no public exploits are known, the vulnerability's nature makes it a viable target for denial of service attacks against enterprise applications relying on JBoss EAP 7.1 and mod_cluster setups. The issue highlights the importance of proper resource allocation and request size validation in AJP connectors and load balancing modules.

Potential Impact

For European organizations, the primary impact of CVE-2023-5379 is the potential for denial of service against critical enterprise applications hosted on Red Hat JBoss EAP 7.1 on RHEL 7. This can disrupt business operations, degrade service availability, and potentially expose sensitive data through error states or misconfigurations. Industries such as finance, government, telecommunications, and manufacturing that rely on JBoss EAP for middleware services are particularly vulnerable. The disruption caused by mod_cluster marking backend instances as error workers can lead to load balancing failures and service outages, impacting end-users and business continuity. Additionally, the vulnerability could be leveraged as part of a larger attack chain to degrade defenses or distract security teams. Given the widespread use of Red Hat products in Europe and the critical role of JBoss EAP in enterprise Java applications, the threat poses a significant operational risk, especially in countries with large enterprise IT infrastructures and digital services dependent on these platforms.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the vulnerability in Undertow and mod_cluster components. 2. Review and tighten the max-header-size configuration in the ajp-listener to reasonable limits that prevent oversized headers without impacting legitimate traffic. 3. Implement monitoring and alerting on mod_cluster error states and backend instance health to detect early signs of exploitation or misconfiguration. 4. Use network-level controls such as firewalls or intrusion prevention systems to detect and block AJP requests with headers exceeding expected sizes. 5. Consider disabling or restricting AJP connectors if not required, or isolate them behind secure network segments to reduce exposure. 6. Conduct regular security assessments and penetration tests focusing on load balancer and backend communication protocols. 7. Educate operations teams about this vulnerability and ensure incident response plans include steps to handle mod_cluster-related DoS scenarios. 8. Evaluate alternative load balancing or proxy solutions if mod_cluster is critical and cannot be adequately secured.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-10-04T11:52:15.504Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc225cf816635ddaff9200

Added to database: 10/25/2025, 1:05:32 AM

Last enriched: 11/7/2025, 11:28:35 AM

Last updated: 12/10/2025, 5:44:08 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats