Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-4317

Опубликовано: 30 нояб. 2011
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 4.3

Описание

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

РелизСтатусПримечание
devel

not-affected

2.2.22-1ubuntu1
hardy

released

2.2.8-1ubuntu0.23
lucid

released

2.2.14-5ubuntu8.8
maverick

released

2.2.16-1ubuntu3.5
natty

released

2.2.17-1ubuntu1.5
oneiric

released

2.2.20-1ubuntu1.2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 100%
0.8939
Высокий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

nvd
больше 13 лет назад

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

debian
больше 13 лет назад

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2 ...

github
больше 3 лет назад

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

oracle-oval
больше 13 лет назад

ELSA-2012-0128: httpd security update (MODERATE)

EPSS

Процентиль: 100%
0.8939
Высокий

4.3 Medium

CVSS2