Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-40438

Опубликовано: 16 сент. 2021
Источник: redhat
CVSS3: 9
EPSS Критический

Описание

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.

Отчет

Impact of the flaw set to Important because the actions an attacker can do varies a lot based on the kind of infrastructure in place, the kind of internal services and resources, and the available endpoints on those services. The attacker should also perform some kind of target-specific reconnaissance in order to find out all the above information. The version of httpd as shipped in Red Hat Enterprise Linux 7 is affected by this flaw even if the upstream code was not, because the Unix Domain Socket support required to trigger the flaw was backported. The version of httpd as shipped in Red hat Enterprise Linux 6 is not affected by this flaw because there is no support for Unix Domain Socket. The flaw can be triggered only if mod_proxy is in use (e.g. ProxyPass, ReverseProxy is used in the httpd configuration files).

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 9httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpdNot affected
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2021:374607.10.2021
JBoss Core Services for RHEL 8jbcs-httpd24-mod_cluster-nativeFixedRHSA-2021:374607.10.2021
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2021:374607.10.2021
JBoss Core Services for RHEL 8jbcs-httpd24-mod_jkFixedRHSA-2021:374607.10.2021
JBoss Core Services for RHEL 8jbcs-httpd24-mod_mdFixedRHSA-2021:374607.10.2021
JBoss Core Services for RHEL 8jbcs-httpd24-mod_securityFixedRHSA-2021:374607.10.2021
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2021:374607.10.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2005117httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"

EPSS

Процентиль: 100%
0.94432
Критический

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9
ubuntu
почти 4 года назад

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

CVSS3: 9
nvd
почти 4 года назад

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

CVSS3: 9
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9
debian
почти 4 года назад

A crafted request uri-path can cause mod_proxy to forward the request ...

CVSS3: 9
github
около 3 лет назад

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

EPSS

Процентиль: 100%
0.94432
Критический

9 Critical

CVSS3

Уязвимость CVE-2021-40438