Bug 1503055 (CVE-2017-12196)
Summary: | CVE-2017-12196 undertow: Client can use bogus uri in Digest authentication | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Bharti Kundal <bkundal> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aboyko, apinnick, apo, asoldano, atangrin, bbaranow, bmaxwell, bmcclain, brian.stansberry, cdewolf, chazlett, csutherl, darran.lofthouse, dblechte, dimitris, dkreling, dosoudil, drieden, eedri, ivassile, iweiss, jawilson, jochrist, jperkins, jshepherd, jwon, krathod, kwills, lgao, mgoldboi, michal.skrivanek, msochure, msvehla, myarboro, nwallace, pdrozd, pgier, pjindal, pmackay, psakar, pslavice, psotirop, rguimara, rnetuka, rstancel, rsvoboda, security-response-team, sherold, smaestri, sthorger, tom.jenkinson, twalsh, vtunka, ykaul |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | bkundal:
needinfo-
|
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | undertow 1.4.18.SP1, undertow 2.0.2.Final, undertow 1.4.24.Final | Doc Type: | If docs needed, set a value |
Doc Text: |
It was discovered that when using Digest authentication, the server does not ensure that the value of the URI in the authorization header matches the URI in the HTTP request line. This allows the attacker to execute a MITM attack and access the desired content on the server.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 03:29:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1563545 | ||
Bug Blocks: | 1499128 |
Description
Bharti Kundal
2017-10-17 09:32:38 UTC
Acknowledgments: Name: Jan Stourac (Red Hat) This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2018:0478 https://access.redhat.com/errata/RHSA-2018:0478 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Via RHSA-2018:0480 https://access.redhat.com/errata/RHSA-2018:0480 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Via RHSA-2018:0479 https://access.redhat.com/errata/RHSA-2018:0479 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Via RHSA-2018:0481 https://access.redhat.com/errata/RHSA-2018:0481 Hello Bharti, the upstream bug JBEAP-13313 is not public. Could you share more information with us about the implications of CVE-2017-12196, which versions of undertow are affected, what was the first fixed version and what commit actually addressed the issue. Thanks, Markus (In reply to Markus Koschany from comment #13) > Hello Bharti, > > the upstream bug JBEAP-13313 is not public. Could you share more information > with us about the implications of CVE-2017-12196, which versions of undertow > are affected, what was the first fixed version and what commit actually > addressed the issue. > > Thanks, > > Markus Hi Markus, I have requested the public facing JIRA for this.Once I have any information I will update you. (In reply to Bharti Kundal from comment #15) > (In reply to Markus Koschany from comment #13) > > Hello Bharti, > > > > the upstream bug JBEAP-13313 is not public. Could you share more information > > with us about the implications of CVE-2017-12196, which versions of undertow > > are affected, what was the first fixed version and what commit actually > > addressed the issue. > > > > Thanks, > > > > Markus > > Hi Markus, > > I have requested the public facing JIRA for this.Once I have any information > I will update you. Hi Markus, Here is the JIRA https://issues.jboss.org/browse/UNDERTOW-1190.Let me know if you have the access now. Thank you. I can access the bug report now. This issue has been addressed in the following products: Red Hat Virtualization 4 for RHEL-7 Via RHSA-2018:1525 https://access.redhat.com/errata/RHSA-2018:1525 This issue has been addressed in the following products: Red Hat Fuse Intergration Services 2.0 based on Fuse 6.3 R7 Via RHSA-2018:2405 https://access.redhat.com/errata/RHSA-2018:2405 This issue has been addressed in the following products: Red Hat Fuse 7.2 Via RHSA-2018:3768 https://access.redhat.com/errata/RHSA-2018:3768 RHSSO rebased to fixed version in 7.2.4 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2020:2561 https://access.redhat.com/errata/RHSA-2020:2561 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2020:2562 https://access.redhat.com/errata/RHSA-2020:2562 |