Apache HTTP Server拒绝服务漏洞


兰儿飞
兰儿飞 2023-10-31 09:24:59 64489
分类专栏: 资讯


Apache HTTP Server在2.4.30至2.4.48版本存在拒绝服务漏洞,该漏洞源于网络系统或产品未对输入的数据进行正确的验证。攻击者可利用该漏洞通过精心编制的请求uri路径可能导致mod_proxy_uwsgi读取分配的内存并崩溃。

CVE ID:CVE-2021-36160

危害级别: 中

漏洞类型: 通用型漏洞

影响产品:Apache HTTP Server >=2.4.30,<=2.4.48

漏洞修复方案:厂商已发布了漏洞修复程序,请及时关注更新:
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E

--- /dev/null
+++ b/content/security/json/CVE-2021-33193.json
@@ -0,0 +1,101 @@
+{
+ "CVE_data_meta": {
+ "ASSIGNER": "security@apache.org",
+ "ID": "CVE-2021-33193",
+ "STATE": "PUBLIC",
+ "TITLE": "Request splitting via HTTP/2 method injection and mod_proxy"
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Apache HTTP Server",
+ "version": {
+ "version_data": [
+ {
+ "version_name": "Apache HTTP Server 2.4",
+ "version_value": "2.4.17 to 2.4.48"
+ }
+ ]
+ }
+ }
+ ]
+ },
+ "vendor_name": "Apache Software Foundation"
+ }
+ ]
+ }
+ },
+ "credit": [
+ {
+ "lang": "eng",
+ "value": "Reported by James Kettle of PortSwigger"
+ }
+ ],
+ "data_format": "MITRE",
+ "data_type": "CVE",
+ "data_version": "4.0",
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.\n\nThis issue affects Apache HTTP Server 2.4.17 to 2.4.48."
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.0.9"
+ },
+ "impact": [
+ {
+ "other": "moderate"
+ }
+ ],
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "Request Splitting"
+ }
+ ]
+ }
+ ]
+ },
+ "references": {
+ "reference_data": [
+ {
+ "refsource": "CONFIRM",
+ "url": "https://portswigger.net/research/http2"
+ },
+ {
+ "refsource": "CONFIRM",
+ "url": "https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch"
+ }
+ ]
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "timeline": [
+ {
+ "lang": "eng",
+ "time": "2021-05-11",
+ "value": "reported"
+ },
+ {
+ "lang": "eng",
+ "time": "2021-08-06",
+ "value": "public"
+ },
+ {
+ "lang": "eng",
+ "time": "2021-09-16",
+ "value": "2.4.49 released"
+ }
+ ]
+}

\ No newline at end of file diff --git a/content/security/json/CVE-2021-36160.json b/content/security/json/CVE-2021-36160.json new file mode 100644 index 0000000..735a35e

--- /dev/null
+++ b/content/security/json/CVE-2021-36160.json
@@ -0,0 +1,97 @@
+{
+ "CVE_data_meta": {
+ "ASSIGNER": "security@apache.org",
+ "ID": "CVE-2021-36160",
+ "STATE": "READY",
+ "TITLE": "mod_proxy_uwsgi out of bound read"
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Apache HTTP Server",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "Apache HTTP Server 2.4",
+ "version_value": "2.4.48"
+ },
+ {
+ "version_affected": "!<",
+ "version_name": "Apache HTTP Server 2.4",
+ "version_value": "2.4.30"
+ }
+ ]
+ }
+ }
+ ]
+ },
+ "vendor_name": "Apache Software Foundation"
+ }
+ ]
+ }
+ },
+ "credit": [
+ {
+ "lang": "eng",
+ "value": "LI ZHI XIN from NSFocus Security Team"
+ }
+ ],
+ "data_format": "MITRE",
+ "data_type": "CVE",
+ "data_version": "4.0",
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS).\n\nThis issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive)."
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.0.9"
+ },
+ "impact": [
+ {
+ "other": "moderate"
+ }
+ ],
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-125 out of bound read"
+ }
+ ]
+ }
+ ]
+ },
+ "references": {
+ "reference_data": [
+ {
+ "refsource": "CONFIRM"
+ }
+ ]
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "timeline": [
+ {
+ "lang": "eng",
+ "time": "2021-04-26",
+ "value": "reported"
+ },
+ {
+ "lang": "eng",
+ "time": "2021-09-16",
+ "value": "2.4.49 release"
+ }
+ ]
+}

\ No newline at end of file

参考:httpd.apache.org/security/vulnerabilities_24.html

图片

网站声明:如果转载,请联系本站管理员。否则一切后果自行承担。

本文链接:https://www.xckfsq.com/news/show.html?id=27914
赞同 0
评论 0 条
兰儿飞L0
粉丝 0 发表 16 + 关注 私信
上周热门
银河麒麟添加网络打印机时,出现“client-error-not-possible”错误提示  1448
银河麒麟打印带有图像的文档时出错  1365
银河麒麟添加打印机时,出现“server-error-internal-error”  1151
统信桌面专业版【如何查询系统安装时间】  1073
统信操作系统各版本介绍  1070
统信桌面专业版【全盘安装UOS系统】介绍  1028
麒麟系统也能完整体验微信啦!  984
统信【启动盘制作工具】使用介绍  627
统信桌面专业版【一个U盘做多个系统启动盘】的方法  575
信刻全自动档案蓝光光盘检测一体机  484
本周热议
我的信创开放社区兼职赚钱历程 40
今天你签到了吗? 27
信创开放社区邀请他人注册的具体步骤如下 15
如何玩转信创开放社区—从小白进阶到专家 15
方德桌面操作系统 14
我有15积分有什么用? 13
用抖音玩法闯信创开放社区——用平台宣传企业产品服务 13
如何让你先人一步获得悬赏问题信息?(创作者必看) 12
2024中国信创产业发展大会暨中国信息科技创新与应用博览会 9
中央国家机关政府采购中心:应当将CPU、操作系统符合安全可靠测评要求纳入采购需求 8

添加我为好友,拉您入交流群!

请使用微信扫一扫!