CVE-2017-12196
undertow: Client can use bogus uri in Digest authentication
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.
Se ha descubierto que undertow, en sus versiones 1.4.18.SP1, 2.0.2.Final y 1.4.24.Final, es vulnerable al usar la autenticación Digest, ya que el servidor no garantiza que el valor del URI en la cabecera Authorization coincida con el URIb en la línea de petición HTTP. Esto permite que el atacante provoque un ataque Man-in-the-Middle (MitM) y acceda al contenido que desee en el servidor.
It was discovered that when using Digest authentication, the server does not ensure that the value of the URI in the authorization header matches the URI in the HTTP request line. This allows the attacker to execute a MITM attack and access the desired content on the server.
Red Hat Fuse enables integration experts, application developers, and business users to collaborate and independently develop connected solutions. Fuse is part of an agile integration solution. Its distributed approach allows teams to deploy integrated services where required. The API-centric, container-based architecture decouples services so they can be created, extended, and deployed independently. This release of Red Hat Fuse 7.2 serves as a replacement for Red Hat Fuse 7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, denial of service, deserialization, and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-01 CVE Reserved
- 2018-03-12 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-863: Incorrect Authorization
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
https://issues.jboss.org/browse/UNDERTOW-1190 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:0478 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2018:0479 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2018:0480 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2018:0481 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2018:1525 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2018:2405 | 2019-10-09 | |
https://access.redhat.com/errata/RHSA-2018:3768 | 2019-10-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12196 | 2019-10-09 | |
https://access.redhat.com/security/cve/CVE-2017-12196 | 2020-06-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1503055 | 2020-06-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Undertow Search vendor "Redhat" for product "Undertow" | <= 1.4.18 Search vendor "Redhat" for product "Undertow" and version " <= 1.4.18" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Undertow Search vendor "Redhat" for product "Undertow" | 1.4.24 Search vendor "Redhat" for product "Undertow" and version "1.4.24" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Undertow Search vendor "Redhat" for product "Undertow" | 2.0.2 Search vendor "Redhat" for product "Undertow" and version "2.0.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 7.0.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "7.0.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Fuse Search vendor "Redhat" for product "Jboss Fuse" | 6.0.0 Search vendor "Redhat" for product "Jboss Fuse" and version "6.0.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Virtualization Search vendor "Redhat" for product "Virtualization" | 4.0 Search vendor "Redhat" for product "Virtualization" and version "4.0" | - |
Affected
|