Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-31813

Опубликовано: 08 июн. 2022
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.

Отчет

This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat JBoss Web Server 3httpd24Will not fix
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-mod_http2FixedRHSA-2022:884008.12.2022
Red Hat Enterprise Linux 8httpdFixedRHSA-2022:764708.11.2022
Red Hat Enterprise Linux 9httpdFixedRHSA-2022:806715.11.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-345
Дефект:
CWE-348
https://bugzilla.redhat.com/show_bug.cgi?id=2095020httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism

EPSS

Процентиль: 11%
0.00039
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

CVSS3: 9.8
nvd
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

CVSS3: 9.8
debian
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* h ...

CVSS3: 9.8
github
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

oracle-oval
почти 3 года назад

ELSA-2022-9682: httpd:2.4 security update (IMPORTANT)

EPSS

Процентиль: 11%
0.00039
Низкий

7.3 High

CVSS3

Уязвимость CVE-2022-31813