Vulnerability Name: | CVE-2017-12196 (CCN-142416) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2017-08-01 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-03-29 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
Summary: | undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-863 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-12196 Source: REDHAT Type: Vendor Advisory RHSA-2018:0478 Source: REDHAT Type: Vendor Advisory RHSA-2018:0479 Source: REDHAT Type: Vendor Advisory RHSA-2018:0480 Source: REDHAT Type: Vendor Advisory RHSA-2018:0481 Source: REDHAT Type: Vendor Advisory RHSA-2018:1525 Source: REDHAT Type: Vendor Advisory RHSA-2018:2405 Source: REDHAT Type: Vendor Advisory RHSA-2018:3768 Source: CCN Type: Red Hat Bugzilla Bug 1503055 (CVE-2017-12196) CVE-2017-12196 undertow: Client can use bogus uri in Digest authentication Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12196 Source: XF Type: UNKNOWN undertow-cve201712196-mitm(142416) Source: CONFIRM Type: Issue Tracking https://issues.jboss.org/browse/UNDERTOW-1190 Source: CCN Type: UNDERTOW-1190 client can use bogus uri in digest authentication | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |