TLP : CLEAR
Date : 03/07/2024
REF NO : CERT / 2024/07/58
Severity Level: Medium
Components Affected
Apache HTTP Server versions prior to 2.4.60
Overview
Multiple vulnerabilities were identified in Apache HTTP Server. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.
Description
Several vulnerabilities have been identified in Apache HTTP Server versions 2.4.59 and earlier, posing significant security risks. One critical issue involves serving WebSocket protocol upgrades over an HTTP/2 connection, which can lead to a null pointer dereference, crashing the server and degrading performance. Another vulnerability in Windows-based systems allows Server-Side Request Forgery (SSRF), potentially leaking NTLM hashes to malicious servers. Additionally, improper URL encoding in the `mod_proxy` module can lead to requests bypassing authentication, while unsafe RewriteRules in the `mod_rewrite` module may enable attackers to execute scripts in unintended directories or disclose source code. In some cases, these RewriteRules can also cause SSRF, directing URLs to be processed by `mod_proxy` unexpectedly. To address these issues, users are strongly recommended to upgrade to version 2.4.60, which fixes these vulnerabilities. This update introduces new configurations such as the “UNCList” directive for handling UNC paths and flags like “UnsafeAllow3F” and “UnsafePrefixStat” to control the behavior of RewriteRules and ensure they operate safely.
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre