{"id":"CVE-2017-12196","details":"undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.","aliases":["GHSA-cp7v-vmv7-6x2q"],"modified":"2026-04-10T03:58:31.213859Z","published":"2018-04-18T01:29:01.443Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0478"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0479"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3768"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0480"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0481"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1525"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2405"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12196"},{"type":"REPORT","url":"https://issues.jboss.org/browse/UNDERTOW-1190"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/undertow-io/undertow","events":[{"introduced":"0"},{"last_affected":"6d47ee68635ab88d6cef1cb0c5ca06c8992b8323"},{"introduced":"0"},{"last_affected":"8a4bfd58914ce498ea615127b2d739f92e107fc0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.4.18"},{"introduced":"0"},{"last_affected":"2.0.2"}]}}],"versions":["1.0.0.Alpha1","1.0.0.Alpha10","1.0.0.Alpha11","1.0.0.Alpha12","1.0.0.Alpha13","1.0.0.Alpha14","1.0.0.Alpha15","1.0.0.Alpha16","1.0.0.Alpha17","1.0.0.Alpha18","1.0.0.Alpha19","1.0.0.Alpha2","1.0.0.Alpha20","1.0.0.Alpha21","1.0.0.Alpha22","1.0.0.Alpha3","1.0.0.Alpha4","1.0.0.Alpha5","1.0.0.Alpha6","1.0.0.Alpha7","1.0.0.Alpha8","1.0.0.Alpha9","1.0.0.Beta1","1.0.0.Beta10","1.0.0.Beta11","1.0.0.Beta12","1.0.0.Beta13","1.0.0.Beta14","1.0.0.Beta15","1.0.0.Beta16","1.0.0.Beta17","1.0.0.Beta18","1.0.0.Beta19","1.0.0.Beta2","1.0.0.Beta20","1.0.0.Beta21","1.0.0.Beta22","1.0.0.Beta23","1.0.0.Beta24","1.0.0.Beta25","1.0.0.Beta26","1.0.0.Beta27","1.0.0.Beta28","1.0.0.Beta29","1.0.0.Beta3","1.0.0.Beta30","1.0.0.Beta31","1.0.0.Beta32","1.0.0.Beta33","1.0.0.Beta4","1.0.0.Beta5","1.0.0.Beta6","1.0.0.Beta7","1.0.0.Beta8","1.0.0.Beta9","1.0.0.CR1","1.0.0.CR2","1.0.0.CR3","1.0.0.CR4","1.0.0.Final","1.0.1.Final","1.0.2.Final","1.0.3.Final","1.1.0.Beta1","1.1.0.Beta2","1.1.0.Beta3","1.1.0.Beta4","1.1.0.Beta5","1.1.0.Beta6","1.1.0.Beta7","1.1.0.Beta8","1.2.0.Beta1","1.2.0.Beta10","1.2.0.Beta2","1.2.0.Beta3","1.2.0.Beta4","1.2.0.Beta5","1.2.0.Beta6","1.2.0.Beta7","1.2.0.Beta8","1.2.0.Beta9","1.2.0.CR1","1.2.0.Final","1.2.1.Final","1.2.2.Final","1.2.3.Final","1.2.4.Final","1.3.0.Beta1","1.3.0.Beta10","1.3.0.Beta11","1.3.0.Beta12","1.3.0.Beta13","1.3.0.Beta2","1.3.0.Beta3","1.3.0.Beta4","1.3.0.Beta5","1.3.0.Beta6","1.3.0.Beta7","1.3.0.Beta8","1.3.0.Beta9","1.3.0.CR1","1.3.0.CR2","1.3.0.CR3","1.3.0.Final","1.3.1.Final","1.3.2.Final","1.3.3.Final","1.4.0.Beta1","1.4.0.CR1","1.4.0.CR2","1.4.0.CR3","1.4.0.CR4","1.4.0.Final","1.4.1.Final","1.4.10.Final","1.4.11.Final","1.4.12.Final","1.4.13.Final","1.4.14.Final","1.4.15.Final","1.4.16.Final","1.4.17.Final","1.4.18.Final","1.4.2.Final","1.4.3.Final","1.4.4.Final","1.4.5.Final","1.4.6.Final","1.4.7.Final","1.4.8.Final","2.0.0.Alpha1","2.0.0.Beta1","2.0.0.Final","2.0.1.Final","2.0.2.Final"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.4.24"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12196.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}