Описание
A vulnerability was found in mod_proxy_cluster. The issue is that the directive should be replaced by the directive as the former does not restrict IP/host access as Require ip IP_ADDRESS
would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss Core Services | jbcs-httpd24-mod_proxy_cluster | Affected | ||
Red Hat JBoss Core Services | mod_proxy_cluster | Affected | ||
Red Hat Enterprise Linux 10 | mod_proxy_cluster | Fixed | RHBA-2025:5309 | 13.05.2025 |
Red Hat Enterprise Linux 10 | mod_proxy_cluster | Fixed | RHSA-2025:9466 | 24.06.2025 |
Red Hat Enterprise Linux 9 | mod_proxy_cluster | Fixed | RHBA-2025:2973 | 18.03.2025 |
Red Hat Enterprise Linux 9 | mod_proxy_cluster | Fixed | RHSA-2025:9434 | 24.06.2025 |
Red Hat Enterprise Linux 9.4 Extended Update Support | mod_proxy_cluster | Fixed | RHSA-2025:9997 | 01.07.2025 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.
A vulnerability was found in mod_proxy_cluster. The issue is that the ...
A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.
ELSA-2025-9466: mod_proxy_cluster security update (MODERATE)
ELSA-2025-9434: mod_proxy_cluster security update (MODERATE)
EPSS
5.4 Medium
CVSS3