Rapid7 Vulnerability & Exploit Database

Apache HTTPD: Potential pattern expansion problem when mod-proxy and mod-rewrite are used together (CVE-2011-3639)

Back to Search

Apache HTTPD: Potential pattern expansion problem when mod-proxy and mod-rewrite are used together (CVE-2011-3639)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
11/30/2011
Created
07/18/2019
Added
07/18/2019
Modified
07/18/2019

Description

The affected asset is vulnerable to this vulnerability ONLY if proxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. Review your web server configuration for validation.

Solution(s)

  • apache-httpd-upgrade-2_0_65
  • apache-httpd-upgrade-2_2_18

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;