CVE-2023-25690
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
07/03/2023
Última modificación:
13/02/2025
Descripción
*** Pendiente de traducción *** Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.<br />
<br />
<br />
<br />
<br />
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule<br />
or ProxyPassMatch in which a non-specific pattern matches<br />
some portion of the user-supplied request-target (URL) data and is then<br />
re-inserted into the proxied request-target using variable <br />
substitution. For example, something like:<br />
<br />
<br />
<br />
<br />
RewriteEngine on<br />
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]<br />
ProxyPassReverse /here/ http://example.com:8080/<br />
<br />
<br />
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 2.4.0 (incluyendo) | 2.4.55 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01
- http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01