ADVISORY!

TLP : CLEAR

Date : 03/07/2024

REF NO : CERT / 2024/07/58

Apache HTTP Server Multiple Vulnerabilities

Severity Level: Medium

Components Affected

Apache HTTP Server versions prior to 2.4.60

Overview

Multiple vulnerabilities were identified in Apache HTTP Server. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.

Description

Several vulnerabilities have been identified in Apache HTTP Server versions 2.4.59 and earlier, posing significant security risks. One critical issue involves serving WebSocket protocol upgrades over an HTTP/2 connection, which can lead to a null pointer dereference, crashing the server and degrading performance. Another vulnerability in Windows-based systems allows Server-Side Request Forgery (SSRF), potentially leaking NTLM hashes to malicious servers. Additionally, improper URL encoding in the `mod_proxy` module can lead to requests bypassing authentication, while unsafe RewriteRules in the `mod_rewrite` module may enable attackers to execute scripts in unintended directories or disclose source code. In some cases, these RewriteRules can also cause SSRF, directing URLs to be processed by `mod_proxy` unexpectedly. To address these issues, users are strongly recommended to upgrade to version 2.4.60, which fixes these vulnerabilities. This update introduces new configurations such as the “UNCList” directive for handling UNC paths and flags like “UnsafeAllow3F” and “UnsafePrefixStat” to control the behavior of RewriteRules and ensure they operate safely.

Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

  • Apache HTTP Server version 2.4.60

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC