Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-12196


undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.


Published

2018-04-18T01:29:01.443

Last Modified

2024-11-21T03:09:01.960

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 4.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-287
  • Type: Primary
    CWE-863

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat undertow ≤ 1.4.18 Yes
Application redhat undertow 1.4.24 Yes
Application redhat undertow 2.0.2 Yes
Application redhat jboss_enterprise_application_platform 7.0.0 Yes
Application redhat jboss_fuse 6.0.0 Yes
Application redhat virtualization 4.0 Yes

References