Логотип exploitDog
bind:"CVE-2023-25690"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-25690"

Количество 18

Количество 18

ubuntu логотип

CVE-2023-25690

около 3 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2023-25690

около 3 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2023-25690

около 3 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
EPSS: Средний
msrc логотип

CVE-2023-25690

около 3 лет назад

Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2023-25690

около 3 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 thr ...

CVSS3: 9.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0803-1

около 3 лет назад

Security update for apache2

EPSS: Средний
rocky логотип

RLSA-2023:1673

почти 3 года назад

Important: httpd:2.4 security update

EPSS: Средний
rocky логотип

RLSA-2023:1670

почти 3 года назад

Important: httpd and mod_http2 security update

EPSS: Средний
github логотип

GHSA-wc6r-9c75-44gq

около 3 лет назад

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
EPSS: Средний
oracle-oval логотип

ELSA-2023-1673

почти 3 года назад

ELSA-2023-1673: httpd:2.4 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-1670

почти 3 года назад

ELSA-2023-1670: httpd and mod_http2 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-1593

почти 3 года назад

ELSA-2023-1593: httpd security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2023-01738

около 3 лет назад

Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 9.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:1658-1

почти 3 года назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1573-1

около 3 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0799-1

около 3 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0764-1

около 3 лет назад

Security update for apache2

EPSS: Низкий
redos логотип

ROS-20230420-01

почти 3 года назад

Множественные уязвимости Apache httpd

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-25690

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
68%
Средний
около 3 лет назад
redhat логотип
CVE-2023-25690

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
68%
Средний
около 3 лет назад
nvd логотип
CVE-2023-25690

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
68%
Средний
около 3 лет назад
msrc логотип
CVE-2023-25690

Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy

CVSS3: 9.8
68%
Средний
около 3 лет назад
debian логотип
CVE-2023-25690

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 thr ...

CVSS3: 9.8
68%
Средний
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0803-1

Security update for apache2

68%
Средний
около 3 лет назад
rocky логотип
RLSA-2023:1673

Important: httpd:2.4 security update

68%
Средний
почти 3 года назад
rocky логотип
RLSA-2023:1670

Important: httpd and mod_http2 security update

68%
Средний
почти 3 года назад
github логотип
GHSA-wc6r-9c75-44gq

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

CVSS3: 9.8
68%
Средний
около 3 лет назад
oracle-oval логотип
ELSA-2023-1673

ELSA-2023-1673: httpd:2.4 security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2023-1670

ELSA-2023-1670: httpd and mod_http2 security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2023-1593

ELSA-2023-1593: httpd security update (IMPORTANT)

почти 3 года назад
fstec логотип
BDU:2023-01738

Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 9.8
68%
Средний
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:1658-1

Security update for apache2

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:1573-1

Security update for apache2

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0799-1

Security update for apache2

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0764-1

Security update for apache2

около 3 лет назад
redos логотип
ROS-20230420-01

Множественные уязвимости Apache httpd

CVSS3: 9.8
почти 3 года назад

Уязвимостей на страницу