[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254492

 
 

909

 
 

198437

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2019-1341 --- httpd

ID: oval:org.secpod.oval:def:1700256Date: (C)2019-11-05   (M)2023-12-20
Class: PATCHFamily: unix




A cross-site scripting vulnerability was found in Apache httpd, affecting the mod_proxy error page. Under certain circumstances, a crafted link could inject content into the HTML displayed in the error page, potentially leading to client-side exploitation.A vulnerability was discovered in Apache httpd, in mod_remoteip. A trusted proxy using the quot;PROXYquot; protocol could send specially crafted headers that can cause httpd to experience a stack buffer overflow or NULL pointer dereference, leading to a crash or other potential consequences.\n\nThis issue could only be exploited by configured trusted intermediate proxy servers. HTTP clients such as browsers could not exploit the vulnerability.A vulnerability was discovered in Apache httpd, in mod_rewrite. Certain self-referential mod_rewrite rules could be fooled by encoded newlines, causing them to redirect to an unexpected location. An attacker could abuse this flaw in a phishing attack or as part of a client-side attack on browsers.

Platform:
Amazon Linux 2
Product:
httpd
Reference:
ALAS2-2019-1341
CVE-2019-10092
CVE-2019-10098
CVE-2019-10097
CVE    3
CVE-2019-10097
CVE-2019-10098
CVE-2019-10092

© SecPod Technologies