Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-37436

Опубликовано: 17 янв. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.

A flaw was found in the mod_proxy module of httpd. A malicious backend can cause the response headers to be truncated because they are not cleaned when an error is found while reading them, resulting in some headers being incorporated into the response body and not being interpreted by a client.

Отчет

This flaw is only exploitable via bad headers generated by a malicious backend or a malicious application. httpd as shipped in Red Hat Enterprise Linux 7, 8, 9 and in RHSCL is vulnerable to this flaw. httpd as shipped in Red Hat Enterprise Linux 6 is not affected. This flaw has been rated as having a security impact of moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. It's recommended to update the affected packages as soon as an update is available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat Software Collectionshttpd24-httpdWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2023:462915.08.2023
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2023:462915.08.2023
Red Hat Enterprise Linux 8httpdFixedRHSA-2023:085221.02.2023
Red Hat Enterprise Linux 9httpdFixedRHSA-2023:097028.02.2023
Text-Only JBCShttpdFixedRHSA-2023:462815.08.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-113
https://bugzilla.redhat.com/show_bug.cgi?id=2161773httpd: mod_proxy: HTTP response splitting

EPSS

Процентиль: 65%
0.00492
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 2 лет назад

Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.

CVSS3: 5.3
nvd
больше 2 лет назад

Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.

CVSS3: 5.3
msrc
3 месяца назад

Описание отсутствует

CVSS3: 5.3
debian
больше 2 лет назад

Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the ...

CVSS3: 5.3
github
больше 2 лет назад

Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.

EPSS

Процентиль: 65%
0.00492
Низкий

5.3 Medium

CVSS3