Description
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3602 | undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server. |
Github GHSA |
GHSA-cp7v-vmv7-6x2q | Incorrect Authorization in Undertow |
References
History
Fri, 23 Aug 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7 |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T18:28:16.713Z
Reserved: 2017-08-01T00:00:00.000Z
Link: CVE-2017-12196
No data.
Status : Modified
Published: 2018-04-18T01:29:01.443
Modified: 2024-11-21T03:09:01.960
Link: CVE-2017-12196
OpenCVE Enrichment
No data.
EUVD
Github GHSA