Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2019-10092 CVE-2019-10097 CVE-2019-10098 CVE-2019-0196 CVE-2019-0197 CVE-2019-9517 CVE-2019-10081 CVE-2020-1927 CVE-2020-1934 CVE-2019-10082 |
CWE-ID | CWE-79 CWE-476 CWE-20 CWE-416 CWE-399 CWE-787 CWE-601 CWE-457 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #3 is available. |
Vulnerable software |
openEuler Operating systems & Components / Operating system mod_ssl Operating systems & Components / Operating system package or component mod_session Operating systems & Components / Operating system package or component mod_proxy_html Operating systems & Components / Operating system package or component mod_md Operating systems & Components / Operating system package or component mod_ldap Operating systems & Components / Operating system package or component httpd-tools Operating systems & Components / Operating system package or component httpd-help Operating systems & Components / Operating system package or component httpd-filesystem Operating systems & Components / Operating system package or component httpd-devel Operating systems & Components / Operating system package or component httpd-debugsource Operating systems & Components / Operating system package or component httpd-debuginfo Operating systems & Components / Operating system package or component httpd Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU20384
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-10092
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data on the mod_proxy error page. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20385
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-10097
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error when processing PROXY header within the mod_remoteip. A remote attacker that controls a trusted proxy server can send a specially crafted PROXY header, trigger stack overflow and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20374
Risk: Medium
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2019-10098
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to incorrect handling of encoded line break characters within rewrite rules. A remote attacker can send a specially crafted HTTP request and potentially bypass security restrictions.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU18109
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-0196
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to a use-after-free error within the mod_http2 module when processing HTTP/2 requests. A remote attacker can make the application to access freed memory during string comparison when determining the method of a request and process the request incorrectly.
Successful exploitation of the vulnerability may allow an attacker to gain access to sensitive information or perform a denial of service attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU18108
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-0197
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error within the mod_http2 module when processing update requests from http/1.1 to http/2, if this was not the first request on a connection. A remote attacker can send specially crafted requests to the affected server and perform denial of service attack.
Successful exploitation of the vulnerability requires that HTTP/2 protocol is enabled for a "http:" host or H2Upgrade is enabled for h2 on a "https:" host.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20340
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-9517
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect implementation of HTTP/2 protocol. A remote attacker can open the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both. MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20373
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-10081
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service attack.
The vulnerability exists due to a boundary error when processing HTTP/2 requests within the mod_http2 module, configured with "H2PushResource". A remote attacker can send specially crafted HTTP/2 requests to the affected server and perform denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26527
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-1927
CWE-ID:
CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data in some "mod_rewrite" configurations. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26528
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-1934
CWE-ID:
CWE-457 - Use of Uninitialized Variable
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the "mod_proxy_ftp" may use uninitialized memory when proxying to a malicious FTP server. A remote attacker can gain unauthorized access to sensitive information on the target system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU20386
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2019-10082
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the mod_http2 when handling connection shutdown. A remote attacker can send specially crafted requests to the affected server and make the mod_http2 to read memory that was already freed.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS
mod_ssl: before 2.4.34-18
mod_session: before 2.4.34-18
mod_proxy_html: before 2.4.34-18
mod_md: before 2.4.34-18
mod_ldap: before 2.4.34-18
httpd-tools: before 2.4.34-18
httpd-help: before 2.4.34-18
httpd-filesystem: before 2.4.34-18
httpd-devel: before 2.4.34-18
httpd-debugsource: before 2.4.34-18
httpd-debuginfo: before 2.4.34-18
httpd: before 2.4.34-18
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2020-1014
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.