CVE-2017-3167

9.8 CRITICAL
Published: June 20, 2017 Modified: November 04, 2025

Description

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.debian.org/security/2017/dsa-3896
Source: security@apache.org
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Source: security@apache.org
Patch Third Party Advisory
http://www.securityfocus.com/bid/99135
Source: security@apache.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038711
Source: security@apache.org
Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2478
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2479
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2483
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3193
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3194
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3195
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3475
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3476
Source: security@apache.org
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3477
Source: security@apache.org
Third Party Advisory
https://security.gentoo.org/glsa/201710-32
Source: security@apache.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180601-0002/
Source: security@apache.org
Third Party Advisory
https://support.apple.com/HT208221
Source: security@apache.org
Third Party Advisory
https://www.nomachine.com/SU08O00185
Source: security@apache.org
Third Party Advisory
https://www.tenable.com/security/tns-2019-09
Source: security@apache.org
Third Party Advisory
http://seclists.org/fulldisclosure/2024/Sep/22
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2017/dsa-3896
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.securityfocus.com/bid/99135
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038711
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2478
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2479
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2483
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3193
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3194
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3195
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3475
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3476
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3477
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/201710-32
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180601-0002/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/HT208221
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.nomachine.com/SU08O00185
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.tenable.com/security/tns-2019-09
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

77 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
9.4%
93th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

redhat debian netapp oracle apache apple