Описание
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.4.29-1ubuntu4.24 |
devel | released | 2.4.54-2ubuntu1 |
esm-infra-legacy/trusty | not-affected | 2.4.7-1ubuntu4.22+esm6 |
esm-infra/bionic | not-affected | 2.4.29-1ubuntu4.24 |
esm-infra/focal | not-affected | 2.4.41-4ubuntu3.12 |
esm-infra/xenial | released | 2.4.18-2ubuntu3.17+esm6 |
focal | released | 2.4.41-4ubuntu3.12 |
impish | released | 2.4.48-3.1ubuntu3.5 |
jammy | released | 2.4.52-1ubuntu4.1 |
kinetic | released | 2.4.54-2ubuntu1 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua ...
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
Уязвимость модуля mod_lua веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3