Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-38473

Опубликовано: 01 июл. 2024
Источник: redhat
CVSS3: 5.3
EPSS Высокий

Описание

Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.

Отчет

This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the 'P' flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files. For more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573. Additionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed. Red Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10httpdNot affected
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Core ServiceshttpdAffected
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2024:523913.08.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2024:523913.08.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_jkFixedRHSA-2024:523913.08.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_mdFixedRHSA-2024:523913.08.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_proxy_clusterFixedRHSA-2024:523913.08.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_securityFixedRHSA-2024:523913.08.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-116
https://bugzilla.redhat.com/show_bug.cgi?id=2295012httpd: Encoding problem in mod_proxy

EPSS

Процентиль: 99%
0.78146
Высокий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
12 месяцев назад

Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

CVSS3: 8.1
nvd
12 месяцев назад

Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

CVSS3: 8.1
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 8.1
debian
12 месяцев назад

Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier ...

CVSS3: 8.1
github
12 месяцев назад

Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

EPSS

Процентиль: 99%
0.78146
Высокий

5.3 Medium

CVSS3

Уязвимость CVE-2024-38473