Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-36760

Опубликовано: 17 янв. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.

A flaw was found in the mod_proxy_ajp module of httpd. The connection is not closed when there is an invalid Transfer-Encoding header, allowing an attacker to smuggle requests to the AJP server, where it forwards requests.

Отчет

This flaw only affects configurations with mod_proxy_ajp loaded and with an AJP backend configured. If there is no proxy configured to an AJP backend the server is not affected and no further mitigation is needed. For more information about the mitigation, check the mitigation section below. The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 6, 7, 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol. This flaw has been rated as having a security impact of moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat Software Collectionshttpd24-httpdWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2023:462915.08.2023
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2023:462915.08.2023
Red Hat Enterprise Linux 8httpdFixedRHSA-2023:085221.02.2023
Red Hat Enterprise Linux 9httpdFixedRHSA-2023:097028.02.2023
Text-Only JBCShttpdFixedRHSA-2023:462815.08.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2161777httpd: mod_proxy_ajp: Possible request smuggling

EPSS

Процентиль: 47%
0.00238
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 9
ubuntu
больше 2 лет назад

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.

CVSS3: 9
nvd
больше 2 лет назад

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.

CVSS3: 9
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 9
debian
больше 2 лет назад

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling' ...

CVSS3: 9.8
github
больше 2 лет назад

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.

EPSS

Процентиль: 47%
0.00238
Низкий

6.5 Medium

CVSS3