First published: Tue Oct 17 2017(Updated: )
It was discovered that when using Digest authentication, the server does not ensure that the value of the URI in the authorization header matches the URI in the HTTP request line. This allows the attacker to execute a MITM attack and access the desired content on the server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-activemq-artemis | <0:1.5.5.009-1.redhat_1.1.ep7.el6 | 0:1.5.5.009-1.redhat_1.1.ep7.el6 |
redhat/eap7-apache-cxf | <0:3.1.13-1.redhat_1.1.ep7.el6 | 0:3.1.13-1.redhat_1.1.ep7.el6 |
redhat/eap7-glassfish-jsf | <0:2.2.13-6.SP5_redhat_1.1.ep7.el6 | 0:2.2.13-6.SP5_redhat_1.1.ep7.el6 |
redhat/eap7-hibernate | <0:5.1.12-1.Final_redhat_1.1.ep7.el6 | 0:5.1.12-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-infinispan | <0:8.2.9-1.Final_redhat_1.1.ep7.el6 | 0:8.2.9-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-ironjacamar | <0:1.4.7-1.Final_redhat_1.1.ep7.el6 | 0:1.4.7-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-jackson-annotations | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-core | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-databind | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-jaxrs-providers | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-module-jaxb-annotations | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-modules-java8 | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jboss-logmanager | <0:2.0.8-1.Final_redhat_1.1.ep7.el6 | 0:2.0.8-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-jboss-server-migration | <0:1.0.3-6.Final_redhat_6.1.ep7.el6 | 0:1.0.3-6.Final_redhat_6.1.ep7.el6 |
redhat/eap7-jbossws-cxf | <0:5.1.10-1.Final_redhat_1.1.ep7.el6 | 0:5.1.10-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-narayana | <0:5.5.31-1.Final_redhat_1.1.ep7.el6 | 0:5.5.31-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-picketlink-bindings | <0:2.5.5-10.SP9_redhat_1.1.ep7.el6 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el6 |
redhat/eap7-picketlink-federation | <0:2.5.5-10.SP9_redhat_1.1.ep7.el6 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el6 |
redhat/eap7-resteasy | <0:3.0.25-1.Final_redhat_1.1.ep7.el6 | 0:3.0.25-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-undertow | <0:1.4.18-4.SP2_redhat_1.1.ep7.el6 | 0:1.4.18-4.SP2_redhat_1.1.ep7.el6 |
redhat/eap7-undertow-jastow | <0:2.0.3-1.Final_redhat_1.1.ep7.el6 | 0:2.0.3-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly | <0:7.1.1-4.GA_redhat_2.1.ep7.el6 | 0:7.1.1-4.GA_redhat_2.1.ep7.el6 |
redhat/eap7-wildfly-elytron | <0:1.1.8-1.Final_redhat_1.1.ep7.el6 | 0:1.1.8-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly-http-client | <0:1.0.9-1.Final_redhat_1.1.ep7.el6 | 0:1.0.9-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly-javadocs | <0:7.1.1-3.GA_redhat_2.1.ep7.el6 | 0:7.1.1-3.GA_redhat_2.1.ep7.el6 |
redhat/eap7-wss4j | <0:2.1.11-1.redhat_1.1.ep7.el6 | 0:2.1.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-xml-security | <0:2.0.9-1.redhat_1.1.ep7.el6 | 0:2.0.9-1.redhat_1.1.ep7.el6 |
redhat/eap7-jboss-ec2-eap | <0:7.1.1-3.1.GA_redhat_3.ep7.el6 | 0:7.1.1-3.1.GA_redhat_3.ep7.el6 |
redhat/eap7-activemq-artemis | <0:1.5.5.009-1.redhat_1.1.ep7.el7 | 0:1.5.5.009-1.redhat_1.1.ep7.el7 |
redhat/eap7-apache-cxf | <0:3.1.13-1.redhat_1.1.ep7.el7 | 0:3.1.13-1.redhat_1.1.ep7.el7 |
redhat/eap7-glassfish-jsf | <0:2.2.13-6.SP5_redhat_1.1.ep7.el7 | 0:2.2.13-6.SP5_redhat_1.1.ep7.el7 |
redhat/eap7-hibernate | <0:5.1.12-1.Final_redhat_1.1.ep7.el7 | 0:5.1.12-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-infinispan | <0:8.2.9-1.Final_redhat_1.1.ep7.el7 | 0:8.2.9-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-ironjacamar | <0:1.4.7-1.Final_redhat_1.1.ep7.el7 | 0:1.4.7-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-jackson-annotations | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-core | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-databind | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-jaxrs-providers | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-module-jaxb-annotations | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-modules-java8 | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jboss-logmanager | <0:2.0.8-1.Final_redhat_1.1.ep7.el7 | 0:2.0.8-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-jboss-server-migration | <0:1.0.3-6.Final_redhat_6.1.ep7.el7 | 0:1.0.3-6.Final_redhat_6.1.ep7.el7 |
redhat/eap7-jbossws-cxf | <0:5.1.10-1.Final_redhat_1.1.ep7.el7 | 0:5.1.10-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-narayana | <0:5.5.31-1.Final_redhat_1.1.ep7.el7 | 0:5.5.31-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-picketlink-bindings | <0:2.5.5-10.SP9_redhat_1.1.ep7.el7 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el7 |
redhat/eap7-picketlink-federation | <0:2.5.5-10.SP9_redhat_1.1.ep7.el7 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el7 |
redhat/eap7-resteasy | <0:3.0.25-1.Final_redhat_1.1.ep7.el7 | 0:3.0.25-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-undertow | <0:1.4.18-4.SP2_redhat_1.1.ep7.el7 | 0:1.4.18-4.SP2_redhat_1.1.ep7.el7 |
redhat/eap7-undertow-jastow | <0:2.0.3-1.Final_redhat_1.1.ep7.el7 | 0:2.0.3-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly | <0:7.1.1-4.GA_redhat_2.1.ep7.el7 | 0:7.1.1-4.GA_redhat_2.1.ep7.el7 |
redhat/eap7-wildfly-elytron | <0:1.1.8-1.Final_redhat_1.1.ep7.el7 | 0:1.1.8-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly-http-client | <0:1.0.9-1.Final_redhat_1.1.ep7.el7 | 0:1.0.9-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly-javadocs | <0:7.1.1-3.GA_redhat_2.1.ep7.el7 | 0:7.1.1-3.GA_redhat_2.1.ep7.el7 |
redhat/eap7-wss4j | <0:2.1.11-1.redhat_1.1.ep7.el7 | 0:2.1.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-xml-security | <0:2.0.9-1.redhat_1.1.ep7.el7 | 0:2.0.9-1.redhat_1.1.ep7.el7 |
redhat/eap7-jboss-ec2-eap | <0:7.1.1-3.1.GA_redhat_3.ep7.el7 | 0:7.1.1-3.1.GA_redhat_3.ep7.el7 |
redhat/undertow | <1.4.18. | 1.4.18. |
redhat/undertow | <2.0.2. | 2.0.2. |
redhat/undertow | <1.4.24. | 1.4.24. |
Red Hat Undertow | <=1.4.18 | |
Red Hat Undertow | =1.4.24 | |
Red Hat Undertow | =2.0.2 | |
JBoss Enterprise Application Platform | =7.0.0 | |
Red Hat JBoss Fuse | =6.0.0 | |
Red Hat Enterprise Virtualization | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2017-12196 is rated as a medium severity vulnerability.
To fix CVE-2017-12196, upgrade to the appropriate version of Red Hat Undertow or other affected packages as specified in the remediation section.
CVE-2017-12196 affects various versions of Red Hat Undertow and related components.
CVE-2017-12196 allows an attacker to conduct a Man-in-the-Middle (MITM) attack.
Yes, CVE-2017-12196 involves a vulnerability in the handling of the URI in the authorization header during Digest authentication.