Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-23048

Опубликовано: 10 июл. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.1

Описание

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

РелизСтатусПримечание
devel

pending

2.4.64-1ubuntu1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

needs-triage

esm-infra/xenial

needs-triage

jammy

released

2.4.52-1ubuntu4.15
noble

released

2.4.58-1ubuntu8.7
plucky

released

2.4.63-1ubuntu1.1
upstream

released

2.4.64-1

Показывать по

EPSS

Процентиль: 25%
0.00084
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 1 месяца назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
nvd
около 1 месяца назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
msrc
около 1 месяца назад

Описание отсутствует

CVSS3: 9.1
debian
около 1 месяца назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to ...

CVSS3: 9.1
redos
29 дней назад

Уязвимость httpd

EPSS

Процентиль: 25%
0.00084
Низкий

9.1 Critical

CVSS3