Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-25690

Опубликовано: 07 мар. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 9.8

Описание

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

РелизСтатусПримечание
bionic

released

2.4.29-1ubuntu4.27
devel

released

2.4.55-1ubuntu2
esm-infra-legacy/trusty

needed

esm-infra/bionic

released

2.4.29-1ubuntu4.27
esm-infra/focal

released

2.4.41-4ubuntu3.14
esm-infra/xenial

released

2.4.18-2ubuntu3.17+esm10
focal

released

2.4.41-4ubuntu3.14
jammy

released

2.4.52-1ubuntu4.4
kinetic

released

2.4.54-2ubuntu1.2
lunar

released

2.4.55-1ubuntu2

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
почти 3 года назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
nvd
почти 3 года назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 9.8
debian
почти 3 года назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 thr ...

suse-cvrf
почти 3 года назад

Security update for apache2

9.8 Critical

CVSS3