Severity
7.5HIGH
EPSS
43.0%
top 2.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 13

Description

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages10 packages

NVDapache/http_server2.4.02.4.38
CVEListV5apache/apache_http_server2.4.0 to 2.4.38
NVDoracle/http_server12.2.1.3.0
Debianapache2< 2.4.38-3+3

Also affects: Debian Linux 8.0, 9.0, Fedora 28, 29, 30, Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-q29r-xr2f-g7j5: In Apache HTTP Server 22022-05-13
OSV
CVE-2019-0217: In Apache HTTP Server 22019-04-08
CVEList
CVE-2019-0217: In Apache HTTP Server 22019-04-08

📋Vendor Advisories

4
Ubuntu
Apache vulnerabilities2019-04-10
Ubuntu
Apache HTTP Server vulnerabilities2019-04-04
Red Hat
httpd: mod_auth_digest: access control bypass due to race condition2019-04-01
Debian
CVE-2019-0217: apache2 - In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth...2019

💬Community

2
Bugzilla
CVE-2019-0217 httpd: mod_auth_digest: access control bypass due to race condition2019-04-02
Bugzilla
CVE-2019-0215 CVE-2019-0217 CVE-2019-0220 httpd: various flaws [fedora-all]2019-04-02
CVE-2019-0217 (HIGH CVSS 7.5) | In Apache HTTP Server 2.4 release 2 | cvebase.io