Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-17567

Опубликовано: 04 июн. 2021
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections.

Меры по смягчению последствий

Only configurations which use mod_proxy_wstunnel are affected by this flaw. It is also safe to comment-out the "LoadModule proxy_wstunnel_module ... " line in /etc/httpd/conf.modules.d/00-proxy.conf for configurations which do not rely on a websockets reverse proxy.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat Enterprise Linux 8httpd:2.4/httpdWill not fix
Red Hat Enterprise Linux 9httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat JBoss Enterprise Web Server 2httpd22Out of support scope
Red Hat Software Collectionshttpd24-httpdWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-aprFixedRHSA-2021:461410.11.2021
JBoss Core Services for RHEL 8jbcs-httpd24-apr-utilFixedRHSA-2021:461410.11.2021
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2021:461410.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1966740httpd: mod_proxy_wstunnel tunneling of non Upgraded connection

EPSS

Процентиль: 90%
0.05655
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
nvd
больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configu ...

CVSS3: 5.3
github
больше 3 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

EPSS

Процентиль: 90%
0.05655
Низкий

4.8 Medium

CVSS3