Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-29404

Опубликовано: 08 июн. 2022
Источник: redhat
CVSS3: 7.5

Описание

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.

Отчет

httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.

Меры по смягчению последствий

Disabling mod_lua and restarting httpd will mitigate this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Core ServiceshttpdNot affected
Red Hat JBoss Core Servicesjbcs-httpd24-httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat JBoss Web Server 3httpd24Will not fix
Red Hat Enterprise Linux 8httpdFixedRHSA-2022:764708.11.2022
Red Hat Enterprise Linux 9httpdFixedRHSA-2022:806715.11.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2022:675329.09.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2095012httpd: mod_lua: DoS in r:parsebody

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

CVSS3: 7.5
nvd
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

CVSS3: 7.5
debian
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua ...

CVSS3: 7.5
github
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

CVSS3: 5.9
fstec
около 3 лет назад

Уязвимость модуля mod_lua веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

7.5 High

CVSS3