Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17567

Опубликовано: 10 июн. 2021
Источник: debian
EPSS Низкий

Описание

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.48-1experimentalpackage
apache2fixed2.4.48-2package
apache2ignoredstretchpackage

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567

  • https://svn.apache.org/r1885605

EPSS

Процентиль: 90%
0.05655
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 4.8
redhat
больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
nvd
больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 5.3
github
больше 3 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

EPSS

Процентиль: 90%
0.05655
Низкий