Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-25690

Опубликовано: 07 мар. 2023
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS3: 9.8

Описание

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

РелизСтатусПримечание
bionic

released

2.4.29-1ubuntu4.27
devel

released

2.4.55-1ubuntu2
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

2.4.29-1ubuntu4.27
esm-infra/focal

not-affected

2.4.41-4ubuntu3.14
esm-infra/xenial

released

2.4.18-2ubuntu3.17+esm10
focal

released

2.4.41-4ubuntu3.14
jammy

released

2.4.52-1ubuntu4.4
kinetic

released

2.4.54-2ubuntu1.2
lunar

released

2.4.55-1ubuntu2

Показывать по

EPSS

Процентиль: 99%
0.73308
Высокий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 2 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
nvd
больше 2 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 9.8
debian
больше 2 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 thr ...

suse-cvrf
больше 2 лет назад

Security update for apache2

EPSS

Процентиль: 99%
0.73308
Высокий

9.8 Critical

CVSS3

Уязвимость CVE-2023-25690