Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jm2g-3f56-rvvh

Опубликовано: 23 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

A vulnerability was found in mod_proxy_cluster. The issue is that the directive should be replaced by the directive as the former does not restrict IP/host access as Require ip IP_ADDRESS would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.

A vulnerability was found in mod_proxy_cluster. The issue is that the directive should be replaced by the directive as the former does not restrict IP/host access as Require ip IP_ADDRESS would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.

EPSS

Процентиль: 14%
0.00047
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 5.4
redhat
5 месяцев назад

A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.

CVSS3: 5.4
nvd
3 месяца назад

A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.

CVSS3: 5.4
debian
3 месяца назад

A vulnerability was found in mod_proxy_cluster. The issue is that the ...

oracle-oval
около 1 месяца назад

ELSA-2025-9466: mod_proxy_cluster security update (MODERATE)

oracle-oval
около 1 месяца назад

ELSA-2025-9434: mod_proxy_cluster security update (MODERATE)

EPSS

Процентиль: 14%
0.00047
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-863