openEuler 20.03 LTS SP1 update for httpd



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-17567
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

httpd-filesystem
Operating systems & Components / Operating system package or component

httpd-help
Operating systems & Components / Operating system package or component

mod_ssl
Operating systems & Components / Operating system package or component

httpd-tools
Operating systems & Components / Operating system package or component

httpd-debuginfo
Operating systems & Components / Operating system package or component

mod_ldap
Operating systems & Components / Operating system package or component

httpd-devel
Operating systems & Components / Operating system package or component

mod_proxy_html
Operating systems & Components / Operating system package or component

mod_session
Operating systems & Components / Operating system package or component

httpd-debugsource
Operating systems & Components / Operating system package or component

mod_md
Operating systems & Components / Operating system package or component

httpd
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU53780

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2019-17567

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to unspecified error within the mod_proxy_wstunnel and mod_proxy_http modules. If mod_proxy_wstunnel is configured on an URL that is not necessarily Upgraded by the origin server and is tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1

httpd-filesystem: before 2.4.43-22

httpd-help: before 2.4.43-22

mod_ssl: before 2.4.43-22

httpd-tools: before 2.4.43-22

httpd-debuginfo: before 2.4.43-22

mod_ldap: before 2.4.43-22

httpd-devel: before 2.4.43-22

mod_proxy_html: before 2.4.43-22

mod_session: before 2.4.43-22

httpd-debugsource: before 2.4.43-22

mod_md: before 2.4.43-22

httpd: before 2.4.43-22

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1230


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###