Описание
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.4.62-1ubuntu1 |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | needs-triage | |
esm-infra/focal | not-affected | 2.4.41-4ubuntu3.19 |
esm-infra/xenial | needs-triage | |
focal | released | 2.4.41-4ubuntu3.19 |
jammy | released | 2.4.52-1ubuntu4.10 |
mantic | released | 2.4.57-2ubuntu2.5 |
noble | released | 2.4.58-1ubuntu8.2 |
oracular | released | 2.4.62-1ubuntu1 |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier ...
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Уязвимость модуля mod_rewrite веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить SSRF-атаку
7.5 High
CVSS3