9

CVE-2021-40438

Warnung

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ResfRocky Linux Version8.0
RedhatJboss Core Services Version1.0
   RedhatEnterprise Linux Version7.0
   RedhatEnterprise Linux Version8.0
RedhatSoftware Collections Version1.0
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
RedhatEnterprise Linux Eus Version8.6
RedhatEnterprise Linux Eus Version8.8
ApacheHTTP Server Version <= 2.4.48
FedoraprojectFedora Version34
FedoraprojectFedora Version35
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
NetappCloud Backup Version-
NetappStoragegrid Version-
F5F5os Version >= 1.1.0 <= 1.1.4
F5F5os Version >= 1.2.0 <= 1.2.1
OracleHTTP Server Version12.2.1.3.0
OracleHTTP Server Version12.2.1.4.0
OracleSecure Global Desktop Version5.6
SiemensSinec Nms Version < 1.0.3
SiemensSinema Server Version14.0 Update-
TenableTenable.Sc Version <= 5.19.1

01.12.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Apache HTTP Server-Side Request Forgery (SSRF)

Schwachstelle

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.43% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9 2.2 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 9 2.2 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-918 Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

https://www.debian.org/security/2021/dsa-4982
Third Party Advisory
Mailing List