Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47252

Опубликовано: 14 июл. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

A vulnerability was found in the Apache HTTP Server. Insufficient escaping of user-supplied data in mod_ssl allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

Отчет

The issue rated as a Moderate vulnerability rather than an Important one because its impact is confined to log integrity without affecting the core security properties of the Apache HTTP Server such as confidentiality, availability, or direct system integrity. The flaw only occurs in non-default logging configurations where administrators explicitly use CustomLog directives with %{varname}x or %{varname}c to log mod_ssl variables like SSL_TLS_SNI, which limits the exposure. While an attacker-controlled TLS client can inject escape or control characters into the logs, potentially leading to log injection or misleading log entries, this does not allow execution of arbitrary code or compromise of the server itself. Furthermore, successful exploitation requires the attacker to craft specific TLS-level parameters, and there are no direct security consequences unless the logs are processed by downstream systems that are themselves vulnerable.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10httpdAffected
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdAffected
Red Hat Enterprise Linux 8httpd:2.4/httpdAffected
Red Hat Enterprise Linux 9httpdAffected
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_jkFixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_mdFixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_proxy_clusterFixedRHSA-2025:1368014.08.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-117
https://bugzilla.redhat.com/show_bug.cgi?id=2374571httpd: insufficient escaping of user-supplied data in mod_ssl

EPSS

Процентиль: 28%
0.001
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 месяца назад

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

CVSS3: 7.5
nvd
около 1 месяца назад

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

CVSS3: 7.5
msrc
около 1 месяца назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 месяца назад

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP ...

CVSS3: 7.5
github
около 1 месяца назад

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

EPSS

Процентиль: 28%
0.001
Низкий

7.5 High

CVSS3