Описание
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.4.29-1ubuntu4.24 |
| devel | released | 2.4.54-2ubuntu1 |
| esm-infra-legacy/trusty | released | 2.4.7-1ubuntu4.22+esm8 |
| esm-infra/bionic | released | 2.4.29-1ubuntu4.24 |
| esm-infra/focal | released | 2.4.41-4ubuntu3.12 |
| esm-infra/xenial | released | 2.4.18-2ubuntu3.17+esm6 |
| focal | released | 2.4.41-4ubuntu3.12 |
| impish | released | 2.4.48-3.1ubuntu3.5 |
| jammy | released | 2.4.52-1ubuntu4.1 |
| kinetic | released | 2.4.54-2ubuntu1 |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* h ...
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3