Security bypass vulnerability in Apache HTTP Server by leveraging the presence of a module that relies on the 2.2 API behaviorID: oval:org.secpod.oval:def:26137 | Date: (C)2015-08-24 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
The host is installed with Apache HTTP Server 2.4.x before 2.4.14 and is prone to a security bypass vulnerability. A flaw is present in the ap_some_auth_required function in server/request.c, which does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting. Successful exploitation will allow remote attackers to bypass intended access restrictions in opportunistic circumstances.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows 10 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Product: |
Apache HTTP Server |