Severity
5.9MEDIUM
EPSS
0.5%
top 33.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 18
Latest updateMay 13

Description

undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages7 packages

Mavenio.undertow:undertow-core2.0.0.Alpha12.0.2.FInal+1
Debianundertow< 1.4.25-1
NVDredhat/undertow1.4.18+2
CVEListV5unspecified/undertowundertow 1.4.18.SP1, undertow 1.4.24.Final, undertow 2.0.2.Final+2

🔴Vulnerability Details

4
OSV
Incorrect Authorization in Undertow2022-05-13
GHSA
Incorrect Authorization in Undertow2022-05-13
OSV
CVE-2017-12196: undertow before versions 12018-04-18
CVEList
CVE-2017-12196: undertow before versions 12018-04-18

📋Vendor Advisories

2
Red Hat
undertow: Client can use bogus uri in Digest authentication2018-03-12
Debian
CVE-2017-12196: undertow - undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnera...2017

💬Community

1
Bugzilla
CVE-2017-12196 undertow: Client can use bogus uri in Digest authentication2017-10-17
CVE-2017-12196 (MEDIUM CVSS 5.9) | undertow before versions 1.4.18.SP1 | cvebase.io