[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2011-009 --- httpd

ID: oval:org.secpod.oval:def:1601241Date: (C)2020-11-27   (M)2023-11-09
Class: PATCHFamily: unix




It was discovered that the Apache HTTP Server did not properly validate the request URI for proxied requests. In certain configurations, if a reverse proxy used the ProxyPassMatch directive, or if it used the RewriteRule directive with the proxy flag, a remote attacker could make the proxy connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to the attacker. It was discovered that mod_proxy_ajp incorrectly returned an "Internal Server Error" response when processing certain malformed HTTP requests, which caused the back-end server to be marked as failed in configurations where mod_proxy was used in load balancer mode. A remote attacker could cause mod_proxy to not send requests to back-end AJP servers for the retry timeout period or until all back-end servers were marked as failed

Platform:
Amazon Linux AMI
Product:
httpd
Reference:
ALAS-2011-9
CVE-2011-3348
CVE-2011-3368
CVE    2
CVE-2011-3368
CVE-2011-3348
CPE    129
cpe:/a:apache:http_server:1.3.32
cpe:/a:apache:http_server:2.0.45
cpe:/a:apache:http_server:1.3.31
cpe:/a:apache:http_server:2.0.44
...

© SecPod Technologies