Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-23048

Опубликовано: 14 июл. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

An access control bypass vulnerability was found in Apache httpd. The Apache HTTP Server with some mod_ssl configurations can bypass the access controls by trusted clients using TLS 1.3 session resumption. A client trusted to access one virtual host may be able to access another if SSLStrictSNIVHostCheck is not enabled on either host.

Отчет

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates. For example, with a different SSLCACertificateFile/Path setting. This vulnerability is rated Moderate rather than Important due to the specific and uncommon configuration prerequisites needed for exploitation. The flaw allows a trusted client—one already holding valid client certificates for one virtual host—to potentially bypass access controls and access another virtual host by leveraging TLS 1.3 session resumption, only if the SSLStrictSNIVHostCheck directive is not enabled on either host. This bypass is not a general remote access issue, nor does it allow an unauthenticated or untrusted attacker to gain access. Furthermore, affected systems are those with complex, multi-tenant SSL client auth setups, which are relatively rare.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10httpdAffected
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdNot affected
Red Hat Enterprise Linux 8httpd:2.4/httpdAffected
Red Hat Enterprise Linux 9httpdAffected
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_jkFixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_mdFixedRHSA-2025:1368014.08.2025
JBoss Core Services for RHEL 8jbcs-httpd24-mod_proxy_clusterFixedRHSA-2025:1368014.08.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=2374576httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption

EPSS

Процентиль: 25%
0.00084
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 1 месяца назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
nvd
около 1 месяца назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
msrc
около 1 месяца назад

Описание отсутствует

CVSS3: 9.1
debian
около 1 месяца назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to ...

CVSS3: 9.1
redos
29 дней назад

Уязвимость httpd

EPSS

Процентиль: 25%
0.00084
Низкий

7.5 High

CVSS3