Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4xc6-mgv4-5v44

Опубликовано: 10 июн. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

EPSS

Процентиль: 11%
0.00039
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-345
CWE-348

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

CVSS3: 7.3
redhat
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

CVSS3: 9.8
nvd
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

CVSS3: 9.8
debian
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* h ...

oracle-oval
почти 3 года назад

ELSA-2022-9682: httpd:2.4 security update (IMPORTANT)

EPSS

Процентиль: 11%
0.00039
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-345
CWE-348