Summary
Detail | |||
---|---|---|---|
Vendor | Apache | First view | 2009-07-05 |
Product | Http Server | Last view | 2022-06-09 |
Version | 2.2.26 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:apache:http_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2022-06-09 | CVE-2022-31813 | Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application. |
7.5 | 2022-06-09 | CVE-2022-30556 | Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer. |
7.5 | 2022-06-09 | CVE-2022-30522 | If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort. |
7.5 | 2022-06-09 | CVE-2022-29404 | In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size. |
9.1 | 2022-06-09 | CVE-2022-28615 | Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. |
5.3 | 2022-06-09 | CVE-2022-28614 | The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue. |
5.3 | 2022-06-09 | CVE-2022-28330 | Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module. |
7.5 | 2022-06-09 | CVE-2022-26377 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions. |
9.8 | 2022-03-14 | CVE-2022-23943 | Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. |
9.8 | 2022-03-14 | CVE-2022-22721 | If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier. |
9.8 | 2022-03-14 | CVE-2022-22720 | Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling |
7.5 | 2022-03-14 | CVE-2022-22719 | A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier. |
9.8 | 2021-12-20 | CVE-2021-44790 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. |
8.2 | 2021-12-20 | CVE-2021-44224 | A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). |
9 | 2021-09-16 | CVE-2021-40438 | A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. |
9.8 | 2021-09-16 | CVE-2021-39275 | ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier. |
7.5 | 2021-09-16 | CVE-2021-36160 | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
7.5 | 2021-09-16 | CVE-2021-34798 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier. |
7.5 | 2021-08-16 | CVE-2021-33193 | A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. |
6.1 | 2021-07-26 | CVE-2021-32792 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, there is an XSS vulnerability in when using `OIDCPreservePost On`. |
5.9 | 2021-07-26 | CVE-2021-32791 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines. |
6.1 | 2021-07-22 | CVE-2021-32786 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression. |
7.5 | 2021-07-22 | CVE-2021-32785 | mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before use when this option is enabled. |
5.3 | 2021-06-10 | CVE-2021-30641 | Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF' |
9.8 | 2021-06-10 | CVE-2021-26691 | In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
10% (7) | CWE-20 | Improper Input Validation |
9% (6) | CWE-787 | Out-of-bounds Write |
9% (6) | CWE-476 | NULL Pointer Dereference |
9% (6) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
6% (4) | CWE-416 | Use After Free |
4% (3) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
4% (3) | CWE-190 | Integer Overflow or Wraparound |
4% (3) | CWE-125 | Out-of-bounds Read |
3% (2) | CWE-770 | Allocation of Resources Without Limits or Throttling |
3% (2) | CWE-399 | Resource Management Errors |
3% (2) | CWE-362 | Race Condition |
3% (2) | CWE-345 | Insufficient Verification of Data Authenticity |
3% (2) | CWE-287 | Improper Authentication |
3% (2) | CWE-200 | Information Exposure |
3% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
3% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
1% (1) | CWE-706 | Use of Incorrectly-Resolved Name or Reference |
1% (1) | CWE-665 | Improper Initialization |
1% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (1) | CWE-384 | Session Fixation |
1% (1) | CWE-330 | Use of Insufficiently Random Values |
1% (1) | CWE-284 | Access Control (Authorization) Issues |
1% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
1% (1) | CWE-189 | Numeric Errors |
1% (1) | CWE-134 | Uncontrolled Format String |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
55553 | Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Functi... |
OpenVAS Exploits
id | Description |
---|---|
2012-10-03 | Name : Mandriva Update for apache MDVSA-2012:154-1 (apache) File : nvt/gb_mandriva_MDVSA_2012_154_1.nasl |
2012-08-10 | Name : FreeBSD Ports: apache File : nvt/freebsd_apache21.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-25 (apache) File : nvt/glsa_201206_25.nasl |
2011-08-09 | Name : CentOS Update for httpd CESA-2009:1148 centos5 i386 File : nvt/gb_CESA-2009_1148_httpd_centos5_i386.nasl |
2011-01-04 | Name : HP-UX Update for Apache-based Web Server HPSBUX02612 File : nvt/gb_hp_ux_HPSBUX02612.nasl |
2010-05-12 | Name : Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006 File : nvt/macosx_upd_10_6_2_secupd_2009-006.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:323 (apache) File : nvt/mdksa_2009_323.nasl |
2009-10-27 | Name : SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1) File : nvt/suse_sa_2009_050.nasl |
2009-10-27 | Name : SLES9: Security update for Apache 2 File : nvt/sles9p5060942.nasl |
2009-10-27 | Name : SLES11: Security update for Apache 2 File : nvt/sles11_apache2.nasl |
2009-10-27 | Name : SLES10: Security update for Apache 2 File : nvt/sles10_apache21.nasl |
2009-09-02 | Name : Ubuntu USN-802-2 (apache2) File : nvt/ubuntu_802_2.nasl |
2009-09-02 | Name : FreeBSD Ports: apache File : nvt/freebsd_apache15.nasl |
2009-09-02 | Name : Fedora Core 11 FEDORA-2009-8812 (httpd) File : nvt/fcore_2009_8812.nasl |
2009-08-17 | Name : Mandrake Security Advisory MDVSA-2009:168 (apache) File : nvt/mdksa_2009_168.nasl |
2009-08-17 | Name : Debian Security Advisory DSA 1834-2 (apache2) File : nvt/deb_1834_2.nasl |
2009-07-29 | Name : Gentoo Security Advisory GLSA 200907-04 (apache) File : nvt/glsa_200907_04.nasl |
2009-07-29 | Name : Mandrake Security Advisory MDVSA-2009:149 (apache) File : nvt/mdksa_2009_149.nasl |
2009-07-29 | Name : CentOS Security Advisory CESA-2009:1148 (httpd) File : nvt/ovcesa2009_1148.nasl |
2009-07-29 | Name : Debian Security Advisory DSA 1834-1 (apache2) File : nvt/deb_1834_1.nasl |
2009-07-29 | Name : RedHat Security Advisory RHSA-2009:1156 File : nvt/RHSA_2009_1156.nasl |
2009-07-29 | Name : Ubuntu USN-799-1 (dbus) File : nvt/ubuntu_799_1.nasl |
2009-07-29 | Name : Ubuntu USN-801-1 (tiff) File : nvt/ubuntu_801_1.nasl |
2009-07-29 | Name : Ubuntu USN-802-1 (apache2) File : nvt/ubuntu_802_1.nasl |
2009-07-29 | Name : RedHat Security Advisory RHSA-2009:1148 File : nvt/RHSA_2009_1148.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0199 | Multiple Vulnerabilities in Apple Mac OS X Severity: Category I - VMSKEY: V0061337 |
2015-A-0174 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0061135 |
2015-A-0149 | Multiple Vulnerabilities in Juniper Networks and Security Manager(NSM) Appliance Severity: Category I - VMSKEY: V0061101 |
2014-A-0172 | Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity: Category I - VMSKEY: V0057381 |
2014-A-0114 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0053307 |
2014-A-0084 | Multiple Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0052631 |
2014-B-0065 | Multiple Vulnerabilities in IBM WebSphere Application Server Severity: Category I - VMSKEY: V0051617 |
2013-A-0146 | Multiple Security Vulnerabilities in Apache HTTP Server Severity: Category I - VMSKEY: V0039573 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-01-12 | Apache Server mod_proxy Error Page cross site scripting attempt RuleID : 56563 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-17 | Apache cookie logging denial of service attempt RuleID : 51547 - Type : SERVER-APACHE - Revision : 1 |
2018-06-05 | HTTP request smuggling attempt RuleID : 46495 - Type : SERVER-OTHER - Revision : 4 |
2017-10-26 | Apache HTTP Server possible OPTIONS method memory leak attempt RuleID : 44434 - Type : SERVER-APACHE - Revision : 6 |
2017-08-31 | Apache mod_auth_digest out of bounds read attempt RuleID : 43790 - Type : SERVER-OTHER - Revision : 3 |
2017-08-15 | httpd mod_mime content-type buffer overflow attempt RuleID : 43547 - Type : SERVER-APACHE - Revision : 2 |
2016-07-28 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737-community - Type : SERVER-WEBAPP - Revision : 2 |
2016-08-31 | HttpOxy CGI application vulnerability potential man-in-the-middle attempt RuleID : 39737 - Type : SERVER-WEBAPP - Revision : 2 |
2015-09-01 | Apache HTTP Server mod_status heap buffer overflow attempt RuleID : 35406 - Type : SERVER-APACHE - Revision : 4 |
2014-01-10 | Apache mod_ssl non-SSL connection to SSL port denial of service attempt RuleID : 11263 - Type : SERVER-APACHE - Revision : 8 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6744ca470d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6ffb18592f.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9cdbb641f9.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-eec13e2e8d.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1104.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2478.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2972.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1104.nasl - Type: ACT_GATHER_INFO |
2018-10-22 | Name: The remote Fedora host is missing a security update. File: fedora_2018-bb9d24c82d.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote web server is affected by a denial of service vulnerability. File: apache_2_4_35.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_e182c076c18911e8a6d2b499baebfeaf.nasl - Type: ACT_GATHER_INFO |
2018-09-11 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0089.nasl - Type: ACT_GATHER_INFO |
2018-09-05 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0181.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0027.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0126.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote web server is affected by multiple vulnerabilities. File: apache_2_4_34.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0037.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0039.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-199-01.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_8b1a50ab8a8e11e8add2b499baebfeaf.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1212.nasl - Type: ACT_GATHER_INFO |
2018-07-03 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1213.nasl - Type: ACT_GATHER_INFO |
2018-05-31 | Name: The remote Debian host is missing a security update. File: debian_DLA-1389.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1151.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1152.nasl - Type: ACT_GATHER_INFO |