Rapid7 Vulnerability & Exploit Database

RHSA-2013:0815: httpd security update

Back to Search

RHSA-2013:0815: httpd security update



The Apache HTTP Server is a popular web server.Cross-site scripting (XSS) flaws were found in the mod_proxy_balancermodule's manager web interface. If a remote attacker could trick a user,who was logged into the manager web interface, into visiting aspecially-crafted URL, it would lead to arbitrary web script execution inthe context of the user's manager interface session. (CVE-2012-4558)It was found that mod_rewrite did not filter terminal escape sequences fromits log file. If mod_rewrite was configured with the RewriteLog directive,a remote attacker could use specially-crafted HTTP requests to injectterminal escape sequences into the mod_rewrite log file. If a victim viewedthe log file with a terminal emulator, it could result in arbitrary commandexecution with the privileges of that user. (CVE-2013-1862)Cross-site scripting (XSS) flaws were found in the mod_info, mod_status,mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An attacker couldpossibly use these flaws to perform XSS attacks if they were able to makethe victim's browser generate an HTTP request with a specially-crafted Hostheader. (CVE-2012-3499)All httpd users should upgrade to these updated packages, which containbackported patches to correct these issues. After installing the updatedpackages, the httpd daemon will be restarted automatically.


  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-debuginfo
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-httpd-tools
  • redhat-upgrade-mod_ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center