vulnerability
Apache HTTPD: mod_proxy_wstunnel tunneling of non Upgraded connections (CVE-2019-17567)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | 2021-06-10 | 2021-12-22 | 2024-12-09 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
2021-06-10
Added
2021-12-22
Modified
2024-12-09
Description
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
Solution
apache-httpd-upgrade-latest
References
- URL-http://httpd.apache.org/security/vulnerabilities_24.html
- URL-http://www.openwall.com/lists/oss-security/2021/06/10/2
- URL-https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
- URL-https://security.gentoo.org/glsa/202107-38
- URL-https://security.netapp.com/advisory/ntap-20210702-0001/
- URL-https://www.oracle.com/security-alerts/cpuoct2021.html
- CVE-2019-17567
- https://attackerkb.com/topics/CVE-2019-17567

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.